Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives [NOOK Book]

Overview

This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example...
See more details below
Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$32.99
BN.com price
(Save 21%)$41.95 List Price

Overview

This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in.

Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services.

*Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level.

*Targets a wide audience: personal computer users, specifically those interested in the online activities of their families.

This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in.

Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services. Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level. Targets a wide audience: personal computer users, specifically those interested in the online activities of their families

Read More Show Less

Product Details

  • ISBN-13: 9780080488653
  • Publisher: Elsevier Science
  • Publication date: 3/15/2005
  • Sold by: Barnes & Noble
  • Format: eBook
  • Edition number: 1
  • Pages: 400
  • Sales rank: 1,216,404
  • File size: 14 MB
  • Note: This product may take a few minutes to download.

Meet the Author

Dr. Eric Cole is an industry recognized security expert, technology visionary and scientist, with over 15 year’s hands-on experience. Dr. Cole currently performs leading edge security consulting and works in research and development to advance the state of the art in information systems security. Dr. Cole has over a decade of experience in information technology, with a focus on perimeter defense, secure network design, vulnerability discovery, penetration testing, and intrusion detection systems. Dr. Cole has a Masters in Computer Science from NYIT, and Ph.D. from Pace University with a concentration in Information Security. Dr. Cole is the author of several books to include Hackers Beware, Hiding in Plain Site, Network Security Bible and Insider Threat. He is also the inventor of over 20 patents and is a researcher, writer, and speaker for SANS Institute and faculty for The SANS Technology Institute, a degree granting institution.
Read More Show Less

Table of Contents

Why Spy? ; Spying Basics ; Technology Overview, Computer Basics ; Technology Overview, Network Basics ; Step 1: Taking Control ; Step 2, Spying on the PC ; Spying on E-mail ; Spying on Chat and Instant Messaging ; Spying on Web Browsing ; Advanced Spying ; Counter-Spy, Are You Being Watched?
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 Customer Reviews
  • Anonymous

    Posted July 2, 2005

    Weird, but very interesting

    I¿ll be honest, this is kind of a weird book, but it¿s also fascinating to read and a must-have if you¿re serious about spying on a family member¿s internet activities. If you struggle with the ethics of spying, then don¿t even bother picking up this book. If you¿re past that and just want to find out what someone is doing online, or if you want a better understanding of what it takes to spy, then you¿re in for a treat. After a brief introduction chapter, and even an ethics discussion, the book dives headfirst into the subject. You can really spy on someone through two different methods: 1) Login to their computer and see what they¿re doing or 2) Get onto their network and sniff their traffic. Both types of spying require different types of skills. Both types of skills are covered in some depth in this book. Logging onto the victim¿s computer (usually a spouse) can usually be done. What is hard is covering your tracks. This book discusses ways to hide what you do, what to look for, how to spy on email, IM conversations, browser history, etc. There is also a very good discussion on keystroke capture devices and software. My favorite part of the book was under the ¿Advanced Techniques¿ section, where the author shows how to perform an ARP spoofing attack. This is a type of attack where you can trick a switch into sending packets to you (from the person you¿re spying on) that you normally wouldn¿t see. Deciding to spy on someone¿s internet activities is a pretty serious decision. If you¿re serious about doing it, and doing it right, then you must read this book. If you¿re not into spying on others, but want to know ways you could be spyed on, then you¿ll want to read this book too. It will open your eyes.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted April 1, 2005

    measure and countermeasure

    With all the continuing publicity in the general media about nefarious activities on the Internet, and the possibility of crackers tunnelling into your computers, the average person might be bewildered at what to believe. This book tries to provide a rational and non-sensationalistic basis for protecting your home computers. Plus, and perhaps more to the point, to safeguard you and your family from online predation. There is necessary but mundane background on the basics of computer hardware and software and networking. But the book quickly moves into numerous spying methods. For surveilling a PC, browser, email, IRC and Instant Messages. Basically, for all the common modes of usage of a computer. The authors show that there are some disturbingly powerful programs and hardware devices floating around out there, available to anyone. Like the Best Free Keylogger, which is available from sourceforge, no less. Scarcely a suss website, eh? BFK captures keystrokes and screen captures, and can periodically email this data to any address on the Internet. A bloke could have some fun with this. A utility of the book is simply alerting you to the existence of programs like this, even if you never avail yourself of it. Which leads into the last section of the book - countermeasures to various methods described earlier in the text. Parse it carefully.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 2 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)