|
|
|
|
LEADER |
00000cam a2200000 c 4500 |
001 |
1763187829 |
003 |
DE-627 |
005 |
20220804180940.0 |
007 |
cr uuu---uuuuu |
008 |
210719s2021 xx |||||o 00| ||eng c |
020 |
|
|
|a 9783030553432
|9 978-3-030-55343-2
|
035 |
|
|
|a (DE-627)1763187829
|
035 |
|
|
|a (DE-599)KEP06116481X
|
035 |
|
|
|a (EBL)EBL6458950
|
035 |
|
|
|a (EBC)EBC6458950
|
035 |
|
|
|a (DE-627-1)06116481X
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rda
|
041 |
|
|
|a eng
|
082 |
0 |
|
|a 025.042
|
084 |
|
|
|a 2,1
|2 ssgn
|
245 |
0 |
0 |
|a Dark Web Investigation
|c Babak Akhgar, Marco Gercke, Stefanos Vrochidis, Helen Gibson; Editors
|
264 |
|
1 |
|a Cham
|b Springer
|c 2021]
|
300 |
|
|
|a 1 Online-Ressource (xvii, 288 Seiten)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
0 |
|
|a Security Informatics and Law Enforcement
|
500 |
|
|
|a Description based on publisher supplied metadata and other sources
|
520 |
|
|
|a Intro -- Foreword -- Acknowledgements -- Contents -- Editor Biographies -- Contributors -- Part I: Foundations -- Chapter 1: Understanding the Dark Web -- 1.1 Introduction -- 1.2 Infrastructure of the Dark Web -- 1.2.1 The Tor Project (Tor): Overview -- 1.2.1.1 Search Engines and Introductory Points -- 1.2.2 Tor Architecture and Routing -- 1.2.2.1 Tor Nodes -- 1.2.2.2 Tor Directory Authorities -- 1.2.2.3 Tor Circuit -- 1.2.2.4 Setting Up Tor -- 1.2.3 The Invisible Internet Project (I2P): Overview -- 1.2.4 I2P Network Database -- 1.2.5 I2P Routers and Tunnels -- 1.2.6 Freenet: Overview -- 1.2.6.1 Freenet's Architecture and Design -- 1.2.6.2 Sharing, Requesting and Accessing Data -- 1.3 Law Enforcement Agency Investigating the Dark Web -- 1.3.1 How Policing the Clear Web Influences the Dark Web -- 1.3.2 The Dark Web Also Poses a "Policing Dilemma" -- 1.4 Concluding Remarks -- References -- Chapter 2: Using the Dark Web -- 2.1 Introduction -- 2.2 Dark Web Users -- 2.2.1 Non-criminal Actors -- 2.2.1.1 Public-Ordinary Users -- 2.2.1.2 Journalists -- 2.2.1.3 Activists -- 2.2.1.4 Businesses and IT Industry -- 2.2.1.5 Law Enforcement Agencies -- 2.2.2 Criminal Actors -- 2.2.2.1 Cybercriminals -- 2.2.2.2 Hacktivists -- 2.2.2.3 Black Hat Hackers and Virus-Hacking Tool Coders -- 2.2.2.4 State-Sponsored Attackers -- 2.2.2.5 Trade and Service Providers and Buyers -- 2.2.2.6 Insider Threat -- 2.2.2.7 Cyberterrorists -- 2.3 Concluding Remarks -- References -- Chapter 3: Terrorist Activities in the Dark and the Surface Web -- 3.1 Introduction -- 3.2 Terrorist's Activities on the Web -- 3.2.1 Propaganda -- 3.2.2 Propaganda and Social Media -- 3.2.3 Propaganda and Dark Web -- 3.2.4 Content of Propaganda -- 3.2.5 Rhetorical Structures of Terrorist Websites -- 3.2.6 Crime as a Service -- 3.2.7 Communications.
|
650 |
|
0 |
|a Dark Web
|
650 |
|
4 |
|a Electronic books
|
700 |
1 |
|
|a Akhgar, Babak
|e HerausgeberIn
|0 (DE-588)1051499909
|0 (DE-627)78636579X
|0 (DE-576)277297311
|4 edt
|
700 |
1 |
|
|a Gercke, Marco
|d 1974-
|e HerausgeberIn
|0 (DE-588)122105486
|0 (DE-627)081739273
|0 (DE-576)182426513
|4 edt
|
700 |
1 |
|
|a Vrochidis, Stefanos
|e HerausgeberIn
|0 (DE-588)1162917369
|0 (DE-627)1027017630
|0 (DE-576)507673409
|4 edt
|
700 |
1 |
|
|a Gibson, Helen
|e HerausgeberIn
|4 edt
|
776 |
1 |
|
|z 9783030553425
|
776 |
0 |
8 |
|i Erscheint auch als
|n Druck-Ausgabe
|z 9783030553425
|
787 |
0 |
8 |
|i Rezensiert in
|a Gulyass, Attila
|t [Rezension von: Dark Web Investigation]
|d 2021
|w (DE-627)178080802X
|
856 |
4 |
0 |
|u https://ebookcentral.proquest.com/lib/kxp/detail.action?docID=6458950
|m X:EBC
|x Aggregator
|z lizenzpflichtig
|3 Volltext
|
912 |
|
|
|a ZDB-30-PQE
|
951 |
|
|
|a BO
|
ELC |
|
|
|a 1
|
ORI |
|
|
|a SA-MARC-krimdok_oa001.raw
|