Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data (Final)

Автор: literator от 21-11-2023, 06:04, Коментариев: 0

Категория: КНИГИ » ПРОГРАММИРОВАНИЕ

Название: Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data (Final)
Автор: Micah Lee
Издательство: No Starch Press
Год: 2024
Страниц: 544
Язык: английский
Формат: epub (true)
Размер: 15.3 MB

Unlock the internet’s treasure trove of public interest data with Hacks, Leaks, and Revelations by Micah Lee, an investigative reporter and security engineer. This hands-on guide blends real-world techniques for researching large datasets with lessons on coding, data authentication, and digital security. All of this is spiced up with gripping stories from the front lines of investigative journalism.

Dive into exposed datasets from a wide array of sources: the FBI, the DHS, police intelligence agencies, extremist groups like the Oath Keepers, and even a Russian ransomware gang. Lee’s own in-depth case studies on disinformation-peddling pandemic profiteers and neo-Nazi chatrooms serve as blueprints for your research.

Gain practical skills in searching massive troves of data for keywords like “antifa” and pinpointing documents with newsworthy revelations. Get a crash course in Python to automate the analysis of millions of files.

Using Python or other programming languages, you can give your computer precise instructions for performing tasks that existing tools or shell scripts don’t allow. For example, you could write a Python script that scours a million pieces of video metadata to determine where the videos were filmed. In my experience, Python is also simpler, easier to understand, and less error-prone than shell scripts. This chapter provides a crash course on the fundamentals of Python programming. You’ll learn to write and execute Python scripts and use the interactive Python interpreter. You’ll also use Python to do math, define variables, work with strings and Boolean logic, loop through lists of items, and use functions. Future chapters rely on your understanding of these basic skills.

You will also learn how to:
Master encrypted messaging to safely communicate with whistleblowers.
Secure datasets over encrypted channels using Signal, Tor Browser, OnionShare, and SecureDrop.
Harvest data from the BlueLeaks collection of internal memos, financial records, and more from over 200 state, local, and federal agencies.
Probe leaked email archives about offshore detention centers and the Heritage Foundation.
Analyze metadata from videos of the January 6 attack on the US Capitol, sourced from the Parler social network.

Скачать Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data




ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!


Нашел ошибку? Есть жалоба? Жми!
Пожаловаться администрации
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.