Hacks, leaks, and revelations the art of analyzing hacked and leaked data
"Covers how to secure and authenticate datasets and safely communicate with sources; Python programming basics for data science investigations; security concepts, like disk encryption; how to work with data in EML, MBOX, JSON, CSV, and SQL formats; and tricks for using the command-line interfac...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
San Francisco, CA :
No Starch Press
2024.
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009784594306719 |
Tabla de Contenidos:
- Protecting sources and yourself
- Acquiring datasets
- The command line interface
- Exploring datasets in the terminal
- Docker, Aleph, and making datasets searchable
- Reading other people's email
- An introduction to Python
- Working with data in Python
- BlueLeaks, Black Lives Matter, and the CSV file format
- BlueLeaks Explorer
- Parler, the January 6 insurrection, and the JSON file format
- Epik fail, extremism research, and SQL Databases
- Pandemic profiteers and COVID-19 disinformation
- Neo-Nazis and their chat rooms.