What Does Google Know about You? And Who Are They Telling?
When you use Google’s “free” services, you pay, big time–with personal information about yourself. Google is making a fortune on what it knows about you...and you may be shocked by just how much Google does know. Googling Security is the first book to reveal how Google’s vast information stockpiles could be used against you or your business–and what you can do to protect yourself.
Unlike other books on Google hacking, this book covers information you disclose when using all of Google’s top applications, not just what savvy users can retrieve via Google’s search results. West Point computer science professor Greg Conti reveals the privacy implications of Gmail, Google Maps, Google Talk, Google Groups, Google Alerts, Google’s new mobile applications, and more. Drawing on his own advanced security research, Conti shows how Google’s databases can be used by others with bad intent, even if Google succeeds in its pledge of “don’t be evil.”
This book is a wake-up call and a “how-to” self-defense manual: an indispensable resource for everyone, from private citizens to security professionals, who relies on Google.
About the Author xxi
Chapter 1: Googling 1
Chapter 2: Information Flows and Leakage 31
Chapter 3: Footprints, Fingerprints, and Connections 59
Chapter 4: Search 97
Chapter 5: Communications 139
Chapter 6: Mapping, Directions, and Imagery 177
Chapter 7: Advertising and Embedded Content 205
Chapter 8: Googlebot 239
Chapter 9: Countermeasures 259
Chapter 10: Conclusions and a Look to the Future 299
"Sinopsis" puede pertenecer a otra edición de este libro.
Greg Conti is an assistant professor of computer science at the U.S. Military Academy in West Point, New York. His research includes security data visualization, usable security, information warfare, and web-based information disclosure. He is the author of Security Data Visualization (No Starch Press, 2007) and has been featured in IEEE Security & Privacy magazine, Communications of the ACM, and IEEE Computer Graphics and Applications magazine. He has spoken at a wide range of academic and hacker conferences, including Black Hat, DEFCON, and the Workshop on Visualization for Computer Security (VizSEC). Conti runs the open source security visualization project RUMINT. His work can be found at www.gregconti.com/ and www.rumint.org/.
"Sobre este título" puede pertenecer a otra edición de este libro.
Descripción Addison-Wesley Professional, 2008. Paperback. Estado de conservación: New. book. Nº de ref. de la librería M0321518667
Descripción Prentice Hall. Estado de conservación: New. Brand New. Nº de ref. de la librería 0321518667
Descripción Addison-Wesley Professional, 2008. Paperback. Estado de conservación: New. Never used!. Nº de ref. de la librería P110321518667
Descripción Addison-Wesley Professional, 2008. Estado de conservación: New. Brand new! Please provide a physical shipping address. Nº de ref. de la librería 9780321518668
Descripción Addison-Wesley Professional, 2008. Paperback. Estado de conservación: Brand New. 1st edition. 332 pages. 9.25x7.25x0.75 inches. In Stock. Nº de ref. de la librería zk0321518667