Hebt u iets om te verkopen?

Hacks, Leaks, and Revelations : The Art of Analyzing Hacked and Leaked Data, ...

Great Book Prices Store
(340676)
Ingeschreven als zakelijke verkoper
US $40,94
OngeveerEUR 35,09
Objectstaat:
Nieuw
3 beschikbaar
Wees gerust. Retourzendingen worden geaccepteerd.
Verzendkosten:
Gratis USPS Media MailTM.
Bevindt zich in: Jessup, Maryland, Verenigde Staten
Levering:
Geschatte levering tussen do, 21 aug en vr, 29 aug tot 94104
Bij geschatte leveringsdatums - nieuw venster of tabblad wordt rekening gehouden met de verwerkingstijd van de verkoper, de postcode van de verzendlocatie, de postcode van de bestemming, en het moment van aanvaarding. Geschatte leveringsdatums zijn ook afhankelijk van de geselecteerde verzendservice en de ontvangst van de betalingbetaling ontvangen - nieuw venster of tabblad. De leveringstermijnen kunnen variëren, vooral gedurende piekperiodes.
Retourbeleid:
14 dagen om te retourneren. Koper betaalt voor retourzending Als u een eBay-verzendlabel gebruikt, wordt dit in mindering gebracht op het terugbetalingsbedrag.
Betalingen:
     Diners Club

Winkel met vertrouwen

Geld-terug-garantie van eBay
Ontvang het object dat u hebt besteld of krijg uw geld terug. Meer informatieGeld-terug-garantie van eBay - nieuw venster of tabblad
De verkoper neemt de volledige verantwoordelijkheid voor deze aanbieding.
eBay-objectnummer:388308207998
Laatst bijgewerkt op 30 jul 2025 08:55:14 CESTAlle herzieningen bekijkenAlle herzieningen bekijken

Specificaties

Objectstaat
Nieuw: Een nieuw, ongelezen en ongebruikt boek in perfecte staat waarin geen bladzijden ontbreken of ...
Book Title
Hacks, Leaks, and Revelations : The Art of Analyzing Hacked and L
ISBN
9781718503120

Over dit product

Product Identifiers

Publisher
No Starch Press, Incorporated
ISBN-10
1718503121
ISBN-13
9781718503120
eBay Product ID (ePID)
4057280594

Product Key Features

Number of Pages
544 Pages
Language
English
Publication Name
Hacks, Leaks, and Revelations : the Art of Analyzing Hacked and Leaked Data
Subject
Intelligence & Espionage, Security / General, Databases / Data Warehousing
Publication Year
2024
Type
Textbook
Subject Area
Political Science, Computers
Author
Micah Lee
Format
Trade Paperback

Dimensions

Item Height
1.5 in
Item Weight
36.2 Oz
Item Length
9.3 in
Item Width
7.1 in

Additional Product Features

Intended Audience
Trade
LCCN
2023-024888
Dewey Edition
23
Reviews
"Micah's book is a fantastic and friendly introduction for journalists, activists, and anyone else who is interested in learning to analyze large data sets but has been too intimidated by the technical details. I hope this book will inspire more people to find the stories inside the data." --Eva Galperin, Director of Cybersecurity at the Electronic Frontier Foundation "Masterfully breaks down how to handle a data leak and provides the reader with hands-on examples to hone their skills. If only I had this book when I broke the news of the Epik data breach!" --Steven Monacelli, Special Investigative Correspondent at the Texas Observer "For more than a decade, Micah Lee has been on the cutting edge of protecting journalists and their sources from surveillance. It's a gift to all of us that he has downloaded his wisdom into this highly readable and vitally important guide." --Julia Angwin, Investigative Journalist at The New York Times "Thanks to whistleblowing leaks, gold mines of valuable digital data now exist. There is no better account than Micah Lee's lively and readable how-to guide for arming journalists and researchers with the tools necessary to find, excavate, and make sense of this rich data. Sourced from Lee's experiences mining data for his hard-hitting journalistic exposes, readers will come away inspired and equipped to follow in his footsteps." --Gabriella Coleman, Harvard Professor, Founder of Hack_Curio, and Tor Project Board Member "As a journalist who has been working with data breaches for close to ten years, actually getting to grips with that data is often the hardest part of any reporting project. Lee's clear and concise book will be an invaluable resource for reporters or researchers just dipping into this sort of data, or those looking for new techniques. I will certainly be using some of the tools myself. Hacked and dumped datasets are rich sources of information that are in the public interest, and Lee's book will only increase the number of important stories others are able to extract from them." --Joseph Cox, Senior Staff Writer at Motherboard/Vice Media "Seamlessly blends real-world stories of whistleblowers and data dumps with a top to bottom guide on how to approach those very scenarios yourself. From protecting sources to accessing leaked data, no page is wasted. A must-read for any researcher or journalist regardless of experience." --Mikael Thalen, Tech and Security Reporter at The Daily Dot "The world is awash in hacked and leaked data, and any investigator or journalist hoping to handle it safely and find the newsworthy threads needs to buy this book. Micah's step-by-step approach to the ethics, safety and tooling is both approachable for the average person with even basic data skills and will also be useful for those with an advanced background. A guide like this was waiting to be written." --AJ Vicens, Reporter at CyberScoop
Illustrated
Yes
Dewey Decimal
070.4
Table Of Content
Introduction Part 1: Sources and Datasets Chapter 1: Protecting Sources and Yourself Chapter 2: Acquiring Datasets Part 2: Tools of the Trade Chapter 3: The Command Line Interface Chapter 4: Exploring Datasets in the Terminal Chapter 5: Docker, Aleph, and Making Datasets Searchable Chapter 6: Reading Other People's Emails Part 3: Writing Code Chapter 7: An Introduction to Python Chapter 8: Working with Data in Python Part 4: Structured Data Chapter 9: BlueLeaks, Black Lives Matter, and the CSV File Format Chapter 10: BlueLeaks Explorer Chapter 11: Parler, the Insurrection of January 6, and the JSON File Format Chapter 12: Epik Fail, Extremism Research, and SQL Databases Part 5: Case Studies Chapter 13: Pandemic Profiteers and COVID-19 Disinformation Chapter 14: Neo-Nazis and Their Chat Rooms Afterword Appendixes Appendix A: Using the Windows Subsystem for Linux Appendix B: Scraping the Web
Synopsis
Unlock the internet's treasure trove of public interest data with Hacks, Leaks, and Revelations by Micah Lee, an investigative reporter and security engineer. This hands-on guide blends real-world techniques for researching large datasets with lessons on coding, data authentication, and digital security. All of this is spiced up with gripping stories from the front lines of investigative journalism. Dive into exposed datasets from a wide array of sources: the FBI, the DHS, police intelligence agencies, extremist groups like the Oath Keepers, and even a Russian ransomware gang. Lee's own in-depth case studies on disinformation-peddling pandemic profiteers and neo-Nazi chatrooms serve as blueprints for your research. Gain practical skills in searching massive troves of data for keywords like "antifa" and pinpointing documents with newsworthy revelations. Get a crash course in Python to automate the analysis of millions of files. You will also learn how to: Master encrypted messaging to safely communicate with whistleblowers. Secure datasets over encrypted channels using Signal, Tor Browser, OnionShare, and SecureDrop. Harvest data from the BlueLeaks collection of internal memos, financial records, and more from over 200 state, local, and federal agencies. Probe leaked email archives about offshore detention centers and the Heritage Foundation. Analyze metadata from videos of the January 6 attack on the US Capitol, sourced from the Parler social network. We live in an age where hacking and whistleblowing can unearth secrets that alter history. Hacks, Leaks, and Revelations is your toolkit for uncovering new stories and hidden truths. Crack open your laptop, plug in a hard drive, and get ready to change history., In the age of hacking and whistleblowing, the internet contains massive troves of leaked information containing goldmines of newsworthy revelations in the public interest - if you know how to unravel them. For investigative journalists or amateur researchers with or without prior programming knowledge, this book gives you the technical expertise to find and interrogate complex datasets, transforming unintelligible files into ground-breaking reports. Through hands-on assignments and examples that highlight real-world cases, information security expert and well-known investigative journalist Micah Lee guides you through the process of analysing leaked datasets from governments, companies, and political groups. You'll dig into hacked files from the BlueLeaks dataset of law enforcement records, analyse social media traffic from those behind the 2021 insurrection at the US Capitol, hear the exclusive story of privately leaked data from the anti-vaccine group America's Frontline Doctors, and much more. You'll also learn the technical skills and Python programming basics needed for data science investigations, security concepts like disk encryption, how to work with data in JSON, CSV, and SQL formats, and tricks for using the command-line interface to explore datasets packed with secrets just waiting to be discovered.
LC Classification Number
PN4775

Objectbeschrijving van de verkoper

Informatie van zakelijke verkoper

Ik verklaar dat al mijn verkoopactiviteiten zullen voldoen aan alle wet- en regelgeving van de EU.
Over deze verkoper

Great Book Prices Store

96,7% positieve feedback1,4M objecten verkocht

Lid geworden op feb 2017
Reageert meestal binnen 24 uur
Ingeschreven als zakelijke verkoper

Gedetailleerde verkopersbeoordelingen

Gemiddelde van de afgelopen 12 maanden
Nauwkeurige beschrijving
4.9
Redelijke verzendkosten
5.0
Verzendtijd
4.9
Communicatie
4.9

Feedback verkoper (386.301)

Alle beoordelingen
Positief
Neutraal
Negatief