安娜的档案需要您的帮助! 许多人试图关停我们,但我们会奋起反击。
➡️ 如果您现在捐赠,您将获得 双倍 的快速下载次数。 有效期至本月底。 捐赠
✕

安娜的档案

📚 人类历史上最大的完全开放的图书馆。 📈 61,654,285 本图书、95,687,150 篇论文被永久保存。
AA 38TB
direct uploads
IA 304TB
scraped by AA
DuXiu 298TB
scraped by AA
Hathi 9TB
scraped by AA
Libgen.li 188TB
collab with AA
Z-Lib 77TB
collab with AA
Libgen.rs 82TB
mirrored by AA
Sci-Hub 90TB
mirrored by AA
⭐️ Our code and data are 100% open source. 了解更多……
✕ 近期下载:  
主页 主页 主页 主页
安娜的档案
主页
搜索
捐赠
🧬 SciDB
常问问题
账户
登录 / 注册
账户
公开资料
已下载文件
我的捐赠
Referrals
Explore
活动
代码浏览器
ISBN Visualization ↗
Community Projects ↗
Open data
数据集
种子
大语言模型数据
关注我们
联系邮箱
安娜的博客 ↗
Reddit ↗
Matrix ↗
Help out
改进元数据
志愿服务与悬赏
翻译 ↗
Development
安娜的软件 ↗
安全性
数字千年版权法(DCMA)/ 版权声明
镜像
annas-archive.li ↗
annas-archive.pm ↗
annas-archive.in ↗
SLUM [无关联] ↗
SLUM 2 [无关联] ↗
搜索搜索 捐赠 x2捐赠 x2
账户账户
搜索设置
排序
高级
增加特定搜索字段
内容
文件类型 open our viewer
更多……
访问方式
来源
语言
更多……
显示
Search settings
下载 期刊文章 数字借阅 元数据
结果集 1-22(总计 22)
zlib/no-category/Nihad A. Hassan/Ransomware Revealed: A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks_85284913.epub
Ransomware Revealed : A Beginner’s Guide to Protecting and Recovering From Ransomware Attacks Nihad A. Hassan Apress : Imprint: Apress, Springer Nature, [New York], 2019
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, recovery methods, and legal issues related to reporting ransomware incidents to authorities and other affected parties. This book also teaches you how to develop a ransomware incident response plan to minimize ransomware damage and recover normal operations quickly. Ransomware is a category of malware that can encrypt your computer and mobile device files until you pay a ransom to unlock them. Ransomware attacks are considered the most prevalent cybersecurity threats today—the number of new ransomware variants has grown 30-fold since 2015 and they currently account for roughly 40% of all spam messages. Attacks have increased in occurrence from one every 40 seconds to one every 14 seconds. Government and private corporations are targets. Despite the security controls set by organizations to protect their digital assets, ransomware is still dominating the world of security and will continue to do so in the future. Ransomware Revealed discusses the steps to follow if a ransomware infection occurs, such as how to pay the ransom through anonymous payment methods, perform a backup and restore your affected files, and search online to find a decryption tool to unlock (decrypt) your files for free. Mitigation steps are discussed in depth for both endpoint devices and network systems. What You Will Learn Be aware of how ransomware infects your system Comprehend ransomware components in simple terms Recognize the different types of ransomware families Identify the attack vectors employed by ransomware to infect computer systems Know how to prevent ransomware attacks from successfully comprising your system and network (i.e., mitigation strategies) Know what to do if a successful ransomware infection takes place Understand how to pay the ransom as well as the pros and cons of paying Set up a ransomware response plan to recover from such attacks Who This Book Is For Those who do not specialize in the cybersecurity field (but have adequate IT skills) and want to fully understand the anatomy of ransomware threats. Although most of the book's content will be understood by ordinary computer users, it will also prove useful for experienced IT users aiming to understand the ins and outs of ransomware threats without diving deep into the technical jargon of the internal structure of ransomware.
更多信息……
英语 [en] · EPUB · 8.9MB · 2019 · 📗 未知类型的图书 · 🚀/zlib · Save
base score: 11068.0, final score: 17508.254
lgli/Nihad A. Hassan & Rami Hijazi [Nihad A. Hassan] - Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence (2018, Apress).epub
Open Source Intelligence Methods and Tools : A Practical Guide to Online Intelligence Nihad A. Hassan & Rami Hijazi [Nihad A. Hassan] Apress : Imprint: Apress, Springer Nature, [United States], 2018
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web. The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. What You'll Learn: Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organization; Use OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackers; Gather corporate intelligence about business competitors and predict future market directions; Conduct advanced searches to gather intelligence from social media sites such as Facebook and Twitter; Understand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs. Who This Book Is For: Penetration testers, digital forensics investigators, intelligence services, military, law enforcement, UN agencies, and for-profit/non-profit enterprises. Nihad A. Hassan is an independent information security consultant, digital forensics and cybersecurity expert, online blogger, and book author. He has been actively conducting research in different areas of information security for more than a decade and has developed numerous cybersecurity education courses and technical guides. He has completed many technical security consulting engagements involving security architectures, penetration testing, computer crime investigation, and cyber Open Source Intelligence (OSINT). Nihad has authored four books and scores of information security articles in various global publications. He also enjoys being involved in security training, education, and motivation. His current work focuses on digital forensics, anti-forensics techniques, digital privacy, and cyber OSINT. He covers different information security topics and related matters on his security blog (DarknessGate) and recently launched a dedicated site for Open Source Intelligence resources. Nihad has a BSc honors degree in computer science from the University of Greenwich in the United Kingdom. He can be followed on Twitter at @DarknessGate, and you can connect to him via LinkedIn (DarknessGate). Rami Hijazi holds a master's degree in information technology (information security) from the University of Liverpool. He works for Mericler, Inc., an education and corporate training firm in Toronto, Canada. Rami is an experienced IT professional who lectures on a wide array of topics, including object-oriented programming, Java, e-commerce, agile development, database design, and data handling analysis. He also works as an information security consultant, where he is involved in the design of encryption systems and wireless networks, intrusion detection and data breach tracking, and planning and development advice for IT departments concerned with contingency planning
更多信息……
英语 [en] · EPUB · 12.7MB · 2018 · 📘 非小说类图书 · 🚀/lgli/zlib · Save
base score: 11068.0, final score: 17499.941
zlib/Computers/Security/Nihad A. Hassan/Digital Forensics Basics: A Practical Guide Using Windows OS_27453884.pdf
Digital Forensics Basics : A Practical Guide Using Windows OS Nihad A. Hassan Apress, Incorporated, 1st ed., 2019-02-26
Keine Beschreibung vorhanden. Erscheinungsdatum: 26.02.2019
更多信息……
英语 [en] · PDF · 15.6MB · 2019 · 📘 非小说类图书 · 🚀/zlib · Save
base score: 11068.0, final score: 17492.32
nexusstc/Ransomware Revealed: A Beginner’s Guide To Protecting And Recovering From Ransomware Attacks/91109a5efc15ecf23be669bae086a5a6.epub
Ransomware Revealed : A Beginner’s Guide to Protecting and Recovering From Ransomware Attacks Nihad A. Hassan Springer/Apress, Springer Nature, [New York], 2019
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, recovery methods, and legal issues related to reporting ransomware incidents to authorities and other affected parties. This book also teaches you how to develop a ransomware incident response plan to minimize ransomware damage and recover normal operations quickly. Ransomware is a category of malware that can encrypt your computer and mobile device files until you pay a ransom to unlock them. Ransomware attacks are considered the most prevalent cybersecurity threats today—the number of new ransomware variants has grown 30-fold since 2015 and they currently account for roughly 40% of all spam messages. Attacks have increased in occurrence from one every 40 seconds to one every 14 seconds. Government and private corporations are targets. Despite the security controls set by organizations to protect their digital assets, ransomware is still dominating the world of security and will continue to do so in the future. Ransomware Revealed discusses the steps to follow if a ransomware infection occurs, such as how to pay the ransom through anonymous payment methods, perform a backup and restore your affected files, and search online to find a decryption tool to unlock (decrypt) your files for free. Mitigation steps are discussed in depth for both endpoint devices and network systems. What You Will Learn Be aware of how ransomware infects your system Comprehend ransomware components in simple terms Recognize the different types of ransomware families Identify the attack vectors employed by ransomware to infect computer systems Know how to prevent ransomware attacks from successfully comprising your system and network (i.e., mitigation strategies) Know what to do if a successful ransomware infection takes place Understand how to pay the ransom as well as the pros and cons of paying Set up a ransomware response plan to recover from such attacks Who This Book Is For Those who do not specialize in the cybersecurity field (but have adequate IT skills) and want to fully understand the anatomy of ransomware threats. Although most of the book's content will be understood by ordinary computer users, it will also prove useful for experienced IT users aiming to understand the ins and outs of ransomware threats without diving deep into the technical jargon of the internal structure of ransomware.
更多信息……
英语 [en] · EPUB · 9.1MB · 2019 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/zlib · Save
base score: 11065.0, final score: 17486.564
nexusstc/Ransomware Revealed: A Beginner’s Guide To Protecting And Recovering From Ransomware Attacks/b806f4dcac1dcd79b84ddf1792d449ce.pdf
Ransomware Revealed : A Beginner’s Guide to Protecting and Recovering From Ransomware Attacks Nihad A. Hassan Springer/Apress, 1st edition, Erscheinungsort nicht ermittelbar, 2019
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, recovery methods, and legal issues related to reporting ransomware incidents to authorities and other affected parties. This book also teaches you how to develop a ransomware incident response plan to minimize ransomware damage and recover normal operations quickly. Ransomware is a category of malware that can encrypt your computer and mobile device files until you pay a ransom to unlock them. Ransomware attacks are considered the most prevalent cybersecurity threats today—the number of new ransomware variants has grown 30-fold since 2015 and they currently account for roughly 40% of all spam messages. Attacks have increased in occurrence from one every 40 seconds to one every 14 seconds. Government and private corporations are targets. Despite the security controls set by organizations to protect their digital assets, ransomware is still dominating the world of security and will continue to do so in the future. Ransomware Revealed discusses the steps to follow if a ransomware infection occurs, such as how to pay the ransom through anonymous payment methods, perform a backup and restore your affected files, and search online to find a decryption tool to unlock (decrypt) your files for free. Mitigation steps are discussed in depth for both endpoint devices and network systems. What You Will Learn Be aware of how ransomware infects your system Comprehend ransomware components in simple terms Recognize the different types of ransomware families Identify the attack vectors employed by ransomware to infect computer systems Know how to prevent ransomware attacks from successfully comprising your system and network (i.e., mitigation strategies) Know what to do if a successful ransomware infection takes place Understand how to pay the ransom as well as the pros and cons of paying Set up a ransomware response plan to recover from such attacks Who This Book Is For Those who do not specialize in the cybersecurity field (but have adequate IT skills) and want to fully understand the anatomy of ransomware threats. Although most of the book's content will be understood by ordinary computer users, it will also prove useful for experienced IT users aiming to understand the ins and outs of ransomware threats without diving deep into the technical jargon of the internal structure of ransomware.
更多信息……
英语 [en] · PDF · 8.3MB · 2019 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/zlib · Save
base score: 11065.0, final score: 17486.172
upload/newsarch_ebooks_2025_10/2019/02/26/1484238370.epub
Digital Forensics Basics : A Practical Guide Using Windows OS Nihad A. Hassan Apress : Imprint: Apress, 1st ed. 2019, Berkeley, CA :, 2019
Keine Beschreibung vorhanden. Erscheinungsdatum: 26.02.2019
更多信息……
英语 [en] · EPUB · 18.4MB · 2019 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/upload/zlib · Save
base score: 11065.0, final score: 17485.71
lgli/Z:\Bibliotik_\A Library\Info_Sec\Digital Forensics Basics A Practical Guide Using Windows OS.pdf
Digital Forensics Basics : A Practical Guide Using Windows OS Hassan, Nihad A. Apress : Imprint: Apress, 1st ed. 2019, Berkeley, CA :, 2019
Table of Contents......Page 5 About the Author......Page 13 About the Technical Reviewer......Page 14 Acknowledgments......Page 15 Introduction......Page 16 Chapter 1: Introduction: Understanding Digital Forensics......Page 20 What Is Digital Forensics?......Page 21 Digital Forensics Goals......Page 22 Cybercrime Attack Mode......Page 23 Malware Distribution......Page 24 SQL Injections......Page 25 Phishing......Page 26 DDoS Attacks......Page 27 Computer Forensics......Page 28 Forensics Data Analysis......Page 29 Civil Ligation......Page 30 Intelligence and Counterintelligence......Page 31 Digital Forensics Investigation Types......Page 32 The Importance of Forensic Readiness for Organizations......Page 33 Digital Evidence......Page 35 Digital Evidence Types......Page 36 Machine/Network-Created Data......Page 37 Locations of Electronic Evidence......Page 39 Challenge of Acquiring Digital Evidence......Page 40 Who Should Collect Digital Evidence?......Page 42 Chain of Custody......Page 43 Seizure......Page 45 Acquisition......Page 46 Analysis......Page 47 Digital Forensics Process Official Guides......Page 48 Digital Forensics Certifications......Page 49 Digital Forensics vs. Other Computing Domain......Page 51 Chapter Summary......Page 52 Decimal (Base-10)......Page 53 Binary......Page 54 Hexadecimal (Base-16)......Page 55 Computer Character Encoding Schema......Page 58 File Structure......Page 59 Digital File Metadata......Page 61 Timestamps Decoder (Tool)......Page 64 Method Two: Using the Built-In Windows Hashing Feature......Page 65 Types of Computer Storage......Page 66 RAM......Page 67 ROM......Page 68 HDD......Page 69 How Is Data Stored on the HDD?......Page 70 SSD......Page 71 Optical Data Storage......Page 72 HPA and DCO......Page 73 NTFS......Page 76 Computing Environment......Page 77 Cloud Computing......Page 78 Infrastructure as a Service (IaaS)......Page 79 Windows Version Variations......Page 80 What Is an IP Address?......Page 81 Digital Forensics Resources and Study Materials......Page 83 Chapter Summary......Page 84 Chapter 3: Computer Forensics Lab Requirements......Page 86 Lab Physical Facility Requirements......Page 88 Environment Controls......Page 90 Hardware Equipment......Page 91 Evidence Container......Page 93 Forensic Workstation......Page 94 Commercial Forensics Tools......Page 96 Free and Open Source Forensic Tools......Page 97 Laboratory Information Management System (LIMS)......Page 98 Validation and Verification of Forensics Hardware and Software......Page 99 Lab Manager......Page 100 Lab Data Backup......Page 101 Training Requirements......Page 102 Lab Policies and Procedures......Page 103 Lab Accreditation Requirements......Page 104 Step 1: Self-Assessment......Page 105 Step 4: Implementation......Page 106 Chapter Summary......Page 107 Chapter 4: Initial Response and  First Responder Tasks......Page 109 Search and Seizure......Page 110 Consent to Search......Page 111 Search Warrant......Page 113 First Responder Toolkit......Page 114 First Responder Tasks......Page 115 Order of Volatility......Page 120 Documenting the Digital Crime Scene......Page 121 Packaging and Transporting Electronic Devices......Page 122 First Responder Questions When Contacted by a Client......Page 123 Witness Interview Questions......Page 124 Chapter Summary......Page 125 Chapter 5: Acquiring Digital Evidence......Page 127 AFF......Page 128 Forensics Image File Validation......Page 129 Acquiring Volatile Memory (Live Acquisition)......Page 130 Virtual Memory (Swap Space)......Page 131 Windows Is Locked......Page 132 Capturing Tool Footprint......Page 133 Capturing RAM Using the DumpIt Tool......Page 134 Belkasoft Live RAM Capturer......Page 136 Capture RAM with FTK Imager......Page 137 Acquiring Nonvolatile Memory (Static Acquisition)......Page 140 Hard Drive Acquisition Methods......Page 141 Logical Acquisition......Page 142 Sparse Acquisition......Page 143 Using FTK Imager to Capture Hard Drive......Page 144 Hard Drive Imaging Risks and Challenges......Page 151 Corrupted or Physically Damaged Hard Drive......Page 152 Network Acquisition......Page 153 Other Challenges......Page 154 Chapter Summary......Page 155 Analyzing Hard Drive Forensic Images......Page 156 Arsenal Image Mounter......Page 157 OSFMount......Page 158 Launching the Wizard and Creating Your First Case......Page 160 How Long Should It Take to Finish the Data Source Analysis Process?......Page 168 Importing a Hash Database......Page 172 Redline......Page 177 Capturing a RAM Memory Using Redline......Page 178 Memory Forensics Using Redline......Page 185 Volatility Framework......Page 188 Chapter Summary......Page 192 Chapter 7: Windows Forensics Analysis......Page 193 Creating a Timeline Using Autopsy......Page 195 Generate a Timeline Report Using Autopsy......Page 197 File Recovery......Page 200 Windows Recycle Bin Forensics......Page 201 Data Carving......Page 207 Architecture of Windows Registry......Page 208 Acquiring Windows Registry......Page 211 Registry Examination......Page 212 Automatic Startup Locations......Page 213 Installed Program Keys in the Windows Registry......Page 215 USB Device Forensics......Page 217 Most Recently Used List......Page 220 Network Analysis......Page 222 Windows Shutdown Time......Page 224 Printer Registry Information......Page 225 Deleted Registry Key Recovery......Page 226 File Format Identification......Page 228 Windows Prefetch Analysis......Page 231 Windows Thumbnail Forensics......Page 233 Jump Lists Forensics......Page 234 AUTOMATICDESTINATIONS-MS......Page 235 CUSTOMDESTINATIONS-MS......Page 236 LNK File Forensics......Page 237 Windows File Analyzer (WFA)......Page 239 Event Log Analysis......Page 240 Hidden Hard Drive Partition Analysis......Page 244 Windows Minidump File Forensics......Page 246 Pagefile.sys......Page 248 Swapfile.sys......Page 249 Windows Volume Shadow Copies Forensics......Page 250 ShadowCopyView......Page 251 Windows 10 Forensics......Page 253 Notification Area Database......Page 254 Cortana Forensics......Page 257 Chapter Summary......Page 259 Chapter 8: Web Browser and E-mail Forensics......Page 260 IE......Page 261 Microsoft Edge Web Browser......Page 264 Firefox......Page 266 Google Chrome......Page 270 History......Page 272 Login Data......Page 275 Bookmarks......Page 276 Cache Folder......Page 277 Other Web Browser Investigation Tools......Page 278 E-mail Forensics......Page 280 Steps in E-mail Communications......Page 281 List of E-mail Protocols......Page 282 E-mail Header Examination......Page 283 View Full Gmail Headers......Page 284 View E-mail Header Using Outlook Mail......Page 285 View Full E-mail Header in Outlook Mail Client......Page 287 Analyzing E-mail Headers......Page 288 eMailTrackerPro (www.emailtrackerpro.com)......Page 291 Determining a Sender’s Geographic Location......Page 294 Investigating E-mail Clients......Page 296 Webmail Forensics......Page 300 E-mail Investigations Challenge......Page 301 Chapter Summary......Page 302 Chapter 9: Antiforensics Techniques......Page 303 Classification of Antiforensics Techniques......Page 304 Digital Steganography......Page 305 Text Steganography......Page 306 Image Steganography......Page 307 Audio-Video Steganography......Page 309 Digital Steganography Tools......Page 310 Data Destruction and Antirecovery Techniques......Page 311 Files’ Metadata Manipulation......Page 313 Encryption Techniques......Page 315 FDE......Page 316 Windows BitLocker......Page 317 EFS......Page 318 Password Cracking......Page 319 Cryptographic Anonymity Techniques......Page 320 Direct Attacks Against Computer Forensics Tools......Page 321 Chapter Summary......Page 322 Chapter 10: Gathering Evidence from OSINT Sources......Page 323 Goals of OSINT Collection......Page 324 OSINF Categories......Page 325 OSINT Benefits......Page 327 Challenges of OSINT......Page 328 The OSINT Cycle......Page 329 OSINT Gathering and the Need for Privacy......Page 330 Surface Web......Page 331 Darknet......Page 332 Online Resources......Page 333 Chapter Summary......Page 334 Report Main Elements......Page 335 Autogenerated Report......Page 336 Chapter Summary......Page 338 Index......Page 339
更多信息……
英语 [en] · PDF · 15.6MB · 2019 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/zlib · Save
base score: 11065.0, final score: 17485.71
nexusstc/Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence/2adc19fb2d42c342aec341bfd12c078a.pdf
Open Source Intelligence Methods and Tools : A Practical Guide to Online Intelligence Nihad A. Hassan; Rami Hijazi Apress : Imprint: Apress, Ciando library, 1st edition, Berkeley, CA, 2018
Open Source Intelligence Methods and Tools focuses on building a deep understanding of how to exploit open source intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support intelligence analysis. The harvested data can be used in different scenarios such as financial, crime, and terrorism investigations as well as in more regular tasks such as analyzing business competitors, running background checks, and acquiring intelligence about individuals and other entities. This book will also improve your skills in acquiring information online from the surface web, the deep web, and the darknet. Many estimates show that 90 percent of useful information acquired by intelligence services comes from public sources (in other words, OSINT sources). Social media sites open up numerous opportunities for investigations because of the vast amount of useful information located in one place. For example, you can get a great deal of personal information about any person worldwide by just checking their Facebook page. This book will show you how to conduct advanced social media investigations to access content believed to be private, use advanced search engines queries to return accurate results, search historical deleted versions of websites, track individuals online using public record databases and people-searching tools, locate information buried in the deep web, access and navigate the dark web, collect intelligence from the dark web, view multiple historic satellite images and street views of any location, search geolocation information within popular social media sites, and more. In short, you will learn how to use a plethora of techniques, tools, and free online services to gather intelligence about any target online. OSINT-gathering activities should be conducted secretly to avoid revealing the searcher’s identity. Therefore, this book will teach you how to conceal your digital identity and become anonymous online. You will learn how to exchange data secretly across hostile environments like the Internet and how to communicate with your peers privately and anonymously. You will also learn how to check your digital footprint and discover what kind of digital traces you are leaving behind and how to delete them. Open Source Intelligence Methods and Tools is an indispensable guide for anyone responsible for collecting online content from public data, and it is a must-have reference for any casual Internet user who wants to dig deeper into the Internet to see what information it contains.
更多信息……
英语 [en] · PDF · 11.4MB · 2018 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/zlib · Save
base score: 11065.0, final score: 17485.32
nexusstc/Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence/e352c3478c16b17a316949a8440874bc.pdf
Open Source Intelligence Methods and Tools : A Practical Guide to Online Intelligence Nihad A. Hassan, Rami Hijazi Apress : Imprint: Apress, Ciando library, 1st edition, Berkeley, CA, 2018
Open Source Intelligence Methods and Tools focuses on building a deep understanding of how to exploit open source intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support intelligence analysis. The harvested data can be used in different scenarios such as financial, crime, and terrorism investigations as well as in more regular tasks such as analyzing business competitors, running background checks, and acquiring intelligence about individuals and other entities. This book will also improve your skills in acquiring information online from the surface web, the deep web, and the darknet. Many estimates show that 90 percent of useful information acquired by intelligence services comes from public sources (in other words, OSINT sources). Social media sites open up numerous opportunities for investigations because of the vast amount of useful information located in one place. For example, you can get a great deal of personal information about any person worldwide by just checking their Facebook page. This book will show you how to conduct advanced social media investigations to access content believed to be private, use advanced search engines queries to return accurate results, search historical deleted versions of websites, track individuals online using public record databases and people-searching tools, locate information buried in the deep web, access and navigate the dark web, collect intelligence from the dark web, view multiple historic satellite images and street views of any location, search geolocation information within popular social media sites, and more. In short, you will learn how to use a plethora of techniques, tools, and free online services to gather intelligence about any target online. OSINT-gathering activities should be conducted secretly to avoid revealing the searcher’s identity. Therefore, this book will teach you how to conceal your digital identity and become anonymous online. You will learn how to exchange data secretly across hostile environments like the Internet and how to communicate with your peers privately and anonymously. You will also learn how to check your digital footprint and discover what kind of digital traces you are leaving behind and how to delete them. Open Source Intelligence Methods and Tools is an indispensable guide for anyone responsible for collecting online content from public data, and it is a must-have reference for any casual Internet user who wants to dig deeper into the Internet to see what information it contains.
更多信息……
英语 [en] · PDF · 11.0MB · 2018 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/zlib · Save
base score: 11065.0, final score: 17484.506
upload/newsarch_ebooks/2018/06/30/1484232127.pdf
Open Source Intelligence Methods and Tools : A Practical Guide to Online Intelligence Nihad A. Hassan, Rami Hijazi Apress : Imprint: Apress, Ciando library, 1st edition, Berkeley, CA, 2018
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web. The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. What You'll Learn: Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organization; Use OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackers; Gather corporate intelligence about business competitors and predict future market directions; Conduct advanced searches to gather intelligence from social media sites such as Facebook and Twitter; Understand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs. Who This Book Is For: Penetration testers, digital forensics investigators, intelligence services, military, law enforcement, UN agencies, and for-profit/non-profit enterprises. Nihad A. Hassan is an independent information security consultant, digital forensics and cybersecurity expert, online blogger, and book author. He has been actively conducting research in different areas of information security for more than a decade and has developed numerous cybersecurity education courses and technical guides. He has completed many technical security consulting engagements involving security architectures, penetration testing, computer crime investigation, and cyber Open Source Intelligence (OSINT). Nihad has authored four books and scores of information security articles in various global publications. He also enjoys being involved in security training, education, and motivation. His current work focuses on digital forensics, anti-forensics techniques, digital privacy, and cyber OSINT. He covers different information security topics and related matters on his security blog (DarknessGate) and recently launched a dedicated site for Open Source Intelligence resources. Nihad has a BSc honors degree in computer science from the University of Greenwich in the United Kingdom. He can be followed on Twitter at @DarknessGate, and you can connect to him via LinkedIn (DarknessGate). Rami Hijazi holds a master's degree in information technology (information security) from the University of Liverpool. He works for Mericler, Inc., an education and corporate training firm in Toronto, Canada. Rami is an experienced IT professional who lectures on a wide array of topics, including object-oriented programming, Java, e-commerce, agile development, database design, and data handling analysis. He also works as an information security consultant, where he is involved in the design of encryption systems and wireless networks, intrusion detection and data breach tracking, and planning and development advice for IT departments concerned with contingency planning
更多信息……
英语 [en] · PDF · 11.3MB · 2018 · 📘 非小说类图书 · 🚀/lgli/lgrs/scihub/upload/zlib · Save
base score: 11065.0, final score: 17483.326
upload/newsarch_ebooks/2018/06/30/1484232127.epub
Open Source Intelligence Methods and Tools : A Practical Guide to Online Intelligence Nihad A. Hassan and Rami Hijazi Apress : Imprint: Apress, Ciando library, 1st edition, Berkeley, CA, 2018
Open Source Intelligence Methods and Tools focuses on building a deep understanding of how to exploit open source intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support intelligence analysis. The harvested data can be used in different scenarios such as financial, crime, and terrorism investigations as well as in more regular tasks such as analyzing business competitors, running background checks, and acquiring intelligence about individuals and other entities. This book will also improve your skills in acquiring information online from the surface web, the deep web, and the darknet. Many estimates show that 90 percent of useful information acquired by intelligence services comes from public sources (in other words, OSINT sources). Social media sites open up numerous opportunities for investigations because of the vast amount of useful information located in one place. For example, you can get a great deal of personal information about any person worldwide by just checking their Facebook page. This book will show you how to conduct advanced social media investigations to access content believed to be private, use advanced search engines queries to return accurate results, search historical deleted versions of websites, track individuals online using public record databases and people-searching tools, locate information buried in the deep web, access and navigate the dark web, collect intelligence from the dark web, view multiple historic satellite images and street views of any location, search geolocation information within popular social media sites, and more. In short, you will learn how to use a plethora of techniques, tools, and free online services to gather intelligence about any target online. OSINT-gathering activities should be conducted secretly to avoid revealing the searcher’s identity. Therefore, this book will teach you how to conceal your digital identity and become anonymous online. You will learn how to exchange data secretly across hostile environments like the Internet and how to communicate with your peers privately and anonymously. You will also learn how to check your digital footprint and discover what kind of digital traces you are leaving behind and how to delete them. Open Source Intelligence Methods and Tools is an indispensable guide for anyone responsible for collecting online content from public data, and it is a must-have reference for any casual Internet user who wants to dig deeper into the Internet to see what information it contains.
更多信息……
英语 [en] · EPUB · 12.7MB · 2018 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/upload/zlib · Save
base score: 11065.0, final score: 17482.965
upload/motw_shc_2025_10/shc/Digital Privacy and Security Using Windows - Nihad Hassan.pdf
Digital Privacy and Security Using Windows : A Practical Guide Nihad A. Hassan, Rami Hijazi (auth.) Apress : Imprint: Apress, 1st ed. 2017, Berkeley, CA, 2017
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You will understand best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows. Digital Privacy and Security Using Windows offers a comprehensive list of practical digital privacy tutorials in addition to being a complete repository of free online resources and tools assembled in one place. The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird. What You'll Learn Know the various parties interested in having your private data Differentiate between government and corporate surveillance, and the motivations behind each one Understand how online tracking works technically Protect digital data, secure online communications, and become anonymous online Cover and destroy your digital traces using Windows OS Secure your data in transit and at rest Be aware of cyber security risks and countermeasures Who This Book Is For End users, information security professionals, management, infosec students
更多信息……
英语 [en] · PDF · 10.3MB · 2017 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/upload/zlib · Save
base score: 11065.0, final score: 17475.445
lgli/Hassan_Open-Source-Intelligence-Metho_9781484232132.pdf
Open Source Intelligence Methods and Tools : A Practical Guide to Online Intelligence Nihad A. Hassan; Rami Hijazi Springer-Verlag GmbH, Springer Nature, [United States], 2018
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web. The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. What You'll Learn Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organization Use OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackers Gather corporate intelligence about business competitors and predict future market directions Conduct advanced searches to gather intelligence from social media sites such as Facebook and Twitter Understand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs Who This Book Is For Penetration testers, digital forensics investigators, intelligence services, military, law enforcement, UN agencies, and for-profit/non-profit enterprises Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden. Produktdetails Produktdetails Verlag: (https://www.buecher.de/ni/search_search/quicksearch/q/cXVlcnk9U3ByaW5nZXIrVmVybGFnK0dtYkgmZmllbGQ9aGVyc3RlbGxlcg==/session/jmrk8js7cqh6phagdoe9lsidrl/) Springer-Verlag GmbH Seitenzahl: 354 Erscheinungstermin: 30. Juni 2018 Englisch ISBN-13: 9781484232132 Artikelnr.: 53083471 (#product_info) Produktdetails Verlag: (https://www.buecher.de/ni/search_search/quicksearch/q/cXVlcnk9U3ByaW5nZXIrVmVybGFnK0dtYkgmZmllbGQ9aGVyc3RlbGxlcg==/session/jmrk8js7cqh6phagdoe9lsidrl/) Springer-Verlag GmbH Seitenzahl: 354 Erscheinungstermin: 30. Juni 2018 Englisch ISBN-13: 9781484232132 Artikelnr.: 53083471
更多信息……
英语 [en] · PDF · 11.4MB · 2018 · 📘 非小说类图书 · 🚀/lgli/lgrs · Save
base score: 11065.0, final score: 17475.064
zlib/no-category/Nihad A. Hassan/Digital Forensics Basics: A Practical Guide Using Windows OS_85264499.epub
Digital Forensics Basics : A Practical Guide Using Windows OS Nihad A. Hassan Apress : Imprint: Apress, Springer Nature, [Berkeley, California], 2019
Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law. Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use. Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills. What You'll Learn: Assemble computer forensics lab requirements, including workstations, tools, and more Document the digital crime scene, including preparing a sample chain of custody form Differentiate between law enforcement agency and corporate investigations Gather intelligence using OSINT sources Acquire and analyze digital evidence Conduct in-depth forensic analysis of Windows operating systems covering Windows 10-specific feature forensics Utilize anti-forensic techniques, including steganography, data destruction techniques, encryption, and anonymity techniques.
更多信息……
英语 [en] · EPUB · 18.4MB · 2019 · 📗 未知类型的图书 · 🚀/zlib · Save
base score: 11068.0, final score: 17473.045
ia/digitalprivacyse0000hass.pdf
Digital Privacy and Security Using Windows : A Practical Guide Nihad Hassan; Rami Hijazi APress : Imprint Apress, APress, APress : Imprint Apress, Springer Nature, [New York, NY], 2017
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You will understand best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows. Digital Privacy and Security Using Windows offers a comprehensive list of practical digital privacy tutorials in addition to being a complete repository of free online resources and tools assembled in one place. The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird. What You'll Learn Know the various parties interested in having your private data Differentiate between government and corporate surveillance, and the motivations behind each one Understand how online tracking works technically Protect digital data, secure online communications, and become anonymous online Cover and destroy your digital traces using Windows OS Secure your data in transit and at rest Be aware of cyber security risks and countermeasures Who This Book Is For End users, information security professionals, management, infosec students
更多信息……
英语 [en] · PDF · 18.6MB · 2017 · 📗 未知类型的图书 · 🚀/ia · Save
base score: 11068.0, final score: 17472.203
upload/newsarch_ebooks_2025_10/2019/02/26/1484238370.pdf
Digital Forensics Basics : A Practical Guide Using Windows OS Nihad A. Hassan Apress : Imprint: Apress, 1st ed. 2019, Berkeley, CA :, 2019
Keine Beschreibung vorhanden. Erscheinungsdatum: 26.02.2019
更多信息……
英语 [en] · PDF · 15.6MB · 2019 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/upload/zlib · Save
base score: 11065.0, final score: 17471.053
nexusstc/Digital Forensics Basics : A Practical Guide Using Windows OS/dcf98920c1cbcf97b53638661e530b2b.pdf
Digital Forensics Basics : A Practical Guide Using Windows OS Nihad A. Hassan Apress : Imprint: Apress, 1st ed. 2019, Berkeley, CA :, 2019
Keine Beschreibung vorhanden. Erscheinungsdatum: 26.02.2019
更多信息……
英语 [en] · PDF · 14.0MB · 2019 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/zlib · Save
base score: 11065.0, final score: 17470.844
upload/newsarch_ebooks_2025_10/2017/10/04/1484227980.epub
Digital Privacy and Security Using Windows : A Practical Guide Nihad A. Hassan and Rami Hijazi Apress : Imprint: Apress, Springer Nature, [New York, NY], 2017
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book teaches you how to secure your online identity and personal devices, encrypt your digital data and online communications, protect cloud data and Internet of Things (IoT), mitigate social engineering attacks, keep your purchases secret, and conceal your digital footprint. You will understand best practices to harden your operating system and delete digital traces using the most widely used operating system, Windows. Digital Privacy and Security Using Windows offers a comprehensive list of practical digital privacy tutorials in addition to being a complete repository of free online resources and tools assembled in one place. The book helps you build a robust defense from electronic crime and corporate surveillance. It covers general principles of digital privacy and how to configure and use various security applications to maintain your privacy, such as TOR, VPN, and BitLocker. You will learn to encrypt email communications using Gpg4win and Thunderbird. What You'll Learn Know the various parties interested in having your private data Differentiate between government and corporate surveillance, and the motivations behind each one Understand how online tracking works technically Protect digital data, secure online communications, and become anonymous online Cover and destroy your digital traces using Windows OS Secure your data in transit and at rest Be aware of cyber security risks and countermeasures Who This Book Is For End users, information security professionals, management, infosec students
更多信息……
英语 [en] · EPUB · 5.3MB · 2017 · 📗 未知类型的图书 · 🚀/upload · Save
base score: 10968.0, final score: 17403.389
upload/newsarch_ebooks_2025_10/2023/06/23/1484242548.mobi
1484242548.mobi Nihad A. Hassan Apress
MOBI · 13.0MB · 📗 未知类型的图书 · 🚀/upload · Save
base score: 10933.0, final score: 17403.139
lgli/K:\!genesis\!repository8\2\9780128044490.pdf
Data Hiding Techniques in Windows OS : A Practical Approach to Investigation and Defense Nihad Ahmad Hassan; Rami Hijazi; Helvi Salminen Syngress, 1st Edition, PS, 2016
In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files. Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows® machine to conceal their private data. Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques. Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world. Computer forensic investigators, law enforcements officers, intelligence services and IT security professionals need a guide to tell them where criminals can conceal their data in Windows® OS & multimedia files and how they can discover concealed data quickly and retrieve it in a forensic way. __Data Hiding Techniques in Windows OS__ is a response to all these concerns. Data hiding topics are usually approached in most books using an academic method, with long math equations about how each hiding technique algorithm works behind the scene, and are usually targeted at people who work in the academic arenas. This book teaches **professionals and end users alike** how they can hide their data and discover the hidden ones using a variety of ways under the most commonly used operating system on earth, Windows®. This is your hands-on guide to understand, detect and use today’s most popular techniques in hiding and exploring hidden data under Windows® machines, covering all Windows® versions from XP till Windows® 10. Starting with the Roman Emperor, Julius Caesar, and his simple cipher method to the surveillance programs deployed by NSA, to monitor communication and online traffic, this book will teach you everything you need to know to protect your digital data using steganographic & anonymity cryptographic techniques. Written in a simple style and requiring only basic knowledge of main Windows® functions, techniques are presented in a way to easily implement them directly on your computer. * A brief history of steganography since early inception to present day * Simple methods to hide your data without using any third party tools, and different ways to investigate and explore hidden data * Exploiting multimedia files to conceal data using text, image, video and audio steganography * Exploiting Windows® NTFS file system to hide your secret data * A wide array of encryption techniques to protect your confidential data and securing your online communications * Using cryptographic anonymity tools to conceal your identity online * Explaining how hidden data could be used to plant a malware and launch sophisticated attacks against computer systems * Methods to crack steganography and cryptography * A chapter dedicated to anti-forensic techniques, detailing how to conceal data when using a Windows® machine
更多信息……
英语 [en] · PDF · 77.9MB · 2016 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11065.0, final score: 0.17483586
duxiu/initial_release/Data hiding techniques in Windows OS a practical approach to investigation and defense_40872323.zip
Data hiding techniques in Windows OS a practical approach to investigation and defense Nihad Ahmad Hassan ; Rami Hijazi ; Helvi Salminen Syngress/Elsevier, 2017
PDF · 86.2MB · 2017 · 📗 未知类型的图书 · 🚀/duxiu · Save
base score: 11055.0, final score: 0.17482385
zlibzh/no-category/Nihad Ahmad Hassan ; Rami Hijazi ; Helvi Salminen/Data hiding techniques in Windows OS a practical approach to investigation and defense_28153820.pdf
Data hiding techniques in Windows OS a practical approach to investigation and defense Nihad Ahmad Hassan ; Rami Hijazi ; Helvi Salminen Syngress/Elsevier, 2017
英语 [en] · PDF · 86.1MB · 2017 · 📗 未知类型的图书 · 🚀/zlibzh · Save
base score: 10962.0, final score: 0.1743419
11 部分匹配
lgli/Nihad Sirees [Sirees, Nihad] - Silence et Tumulte (2012, Robert Laffont).epub
Silence et Tumulte Nihad Sirees [Sirees, Nihad] Groupe Robert Laffont, 2012
" –; Je vous en supplie, trouvez-moi un nom approprié à ce que nous sommes en train de vivre. –; Un nom approprié ? C'est tout ce que vous attendez de moi ? Surréaliste. C'est ça, le mot qui convient. " Une journée dans la vie de Fathi Chin, écrivain célèbre interdit de publication par le Guide suprême de son pays (un pays arabe qui pourrait être... la Syrie). Une journée à l'absurdité kafkaïenne, où s'exerce la tyrannie très ordinaire d'un régime dictatorial. Ce jour-là, le pays tout entier célèbre par un interminable défilé les vingt ans de pouvoir de son despote. Il fait une chaleur accablante, téléviseurs et haut-parleurs hurlent à plein volume et une énorme masse de citoyens engloutit la ville. Chassé de son lit par le tintamarre, Fathi sort de chez lui pour rendre visite à sa mère. Mais à peine a-t-il franchi le seuil de son appartement qu'il est déjà dans les ennuis : dérogeant à tous ses principes, il porte assistance à un jeune homme tabassé à mort par des miliciens. Sa carte d'identité lui est retirée et il est sommé de se rendre à au commissariat pour la récupérer. En attendant, c'est à ses risques et périls qu'il circule sans papiers dans les rues. Des rues où la foule exaltée par les slogans, abasourdie par le bruit et rendue folle par la chaleur ne se contrôle plus. Qu'importe cependant s'il y a des centaines de victimes, comme cette inconnue que Fathi transporte sur son dos jusqu'à l'hôpital, où viennent s'échouer les vivants et les morts. C'est pour la gloire du maître qu'ils ont donné leur vie, pour le leader qu'ils souffrent. Un leader qui, enfermé dans son palais, passera en boucle, sur les murs de chacune des pièces, les images de cette célébration mortelle. Et si Fathi croyait pouvoir échapper à ce délire organisé en se réfugiant chez sa mère, il se trompait. Car dans sa volonté de gagner à sa cause cet écrivain dissident, le Guide suprême a décidé de s'immiscer jusque dans sa famille : sa mère apprend à Fathi qu'elle va épouser M. Haïd, l'un des membres les plus éminents du gouvernement. Il ne reste donc à Fathi qu'un seul havre où se mettre hors d'atteinte du pouvoir : l'appartement de Lama, sa maîtresse, où leurs deux corps complices s'enlaceront sur le seul territoire qu'il leur reste : l'amour. L'union des corps comme acte de dissidence et ultime liberté. Mais déjà 18 heures sonnent, il est temps de gagner le commissariat. Réconcilié avec la vie grâce à Lama, Fathi rejoint l'hôtel de police. Là, il est renvoyé de service en service, oublié dans une antichambre, jeté dans une cellule d'isolement, ramené à la surface, et de nouveau bringuebalé d'un fonctionnaire à l'autre. Il ne lui reste qu'une arme à opposer à la bureaucratie de ce régime absurde : l'ironie. Comment résister autrement au bruit infernal qui vous dévore l'âme ? Qu'opposer aux menaces contre sa mère ? À la promesse d'être autorisé à publier s'il rentre dans le rang ? Jouant les trouble-fête dans cette farce grinçante qu'est l'existence sous une dictature, Fathi finit par ne plus savoir quand la réalité cède la place au rêve éveillé, puis au cauchemar.
更多信息……
法语 [fr] · EPUB · 0.3MB · 2012 · 📕 小说类图书 · 🚀/lgli/zlib · Save
base score: 11053.0, final score: 28.109037
lgli/R:\!fiction\0day\eng\_IRC\2018\2018-n090\Nihad Sirees - States of Passion (retail) (epub).epub
States of Passion Sirees, Nihad; Weiss, Max Pushkin Press, Bookwire GmbH, London, 2018
A mysterious tale-within-a-tale of family secrets by the most prominent Syrian author working today The world is so strange, The strangest things are the stories you overhear. When a hapless bureaucrat finds himself stranded in the countryside during a raging storm, he seeks refuge in a grand yet isolated mansion, inhabited by only an elderly gentleman and his unwelcoming servant. The tale of family secrets he encounters while sheltering there begins with a faded photograph in yellowed newspaper, of a beautiful woman stepping off a train at Aleppo station many years ago. It transports him to Syria's golden age, to the heart of the mysterious, unconventional banat al-ishreh – the infamous women who live, dance and play music together – and into a tangled web of forbidden love. Nihad Sirees was born in Aleppo, Syria in 1950. After working as an engineer, he became an acclaimed novelist, playwright and screenwriter, but found himself under increasing surveillance and pressure from the Syrian government. In 2012, he left for Egypt and now lives and works in exile. Pushkin Press also publish The Silence and the Roar, banned in Syria, and his first novel to be published in English. He now lives in Berlin, Germany.
更多信息……
英语 [en] · EPUB · 0.5MB · 2018 · 📕 小说类图书 · 🚀/lgli/lgrs/zlib · Save
base score: 11055.0, final score: 27.18476
lgli/Nihad Sirees [Sirees, Nihad] - Silence et Tumulte (2012, Robert Laffont).pdf
Silence et Tumulte Nihad Sirees [Sirees, Nihad] Groupe Robert Laffont, 2012
" –; Je vous en supplie, trouvez-moi un nom approprié à ce que nous sommes en train de vivre. –; Un nom approprié ? C'est tout ce que vous attendez de moi ? Surréaliste. C'est ça, le mot qui convient. " Une journée dans la vie de Fathi Chin, écrivain célèbre interdit de publication par le Guide suprême de son pays (un pays arabe qui pourrait être... la Syrie). Une journée à l'absurdité kafkaïenne, où s'exerce la tyrannie très ordinaire d'un régime dictatorial. Ce jour-là, le pays tout entier célèbre par un interminable défilé les vingt ans de pouvoir de son despote. Il fait une chaleur accablante, téléviseurs et haut-parleurs hurlent à plein volume et une énorme masse de citoyens engloutit la ville. Chassé de son lit par le tintamarre, Fathi sort de chez lui pour rendre visite à sa mère. Mais à peine a-t-il franchi le seuil de son appartement qu'il est déjà dans les ennuis : dérogeant à tous ses principes, il porte assistance à un jeune homme tabassé à mort par des miliciens. Sa carte d'identité lui est retirée et il est sommé de se rendre à au commissariat pour la récupérer. En attendant, c'est à ses risques et périls qu'il circule sans papiers dans les rues. Des rues où la foule exaltée par les slogans, abasourdie par le bruit et rendue folle par la chaleur ne se contrôle plus. Qu'importe cependant s'il y a des centaines de victimes, comme cette inconnue que Fathi transporte sur son dos jusqu'à l'hôpital, où viennent s'échouer les vivants et les morts. C'est pour la gloire du maître qu'ils ont donné leur vie, pour le leader qu'ils souffrent. Un leader qui, enfermé dans son palais, passera en boucle, sur les murs de chacune des pièces, les images de cette célébration mortelle. Et si Fathi croyait pouvoir échapper à ce délire organisé en se réfugiant chez sa mère, il se trompait. Car dans sa volonté de gagner à sa cause cet écrivain dissident, le Guide suprême a décidé de s'immiscer jusque dans sa famille : sa mère apprend à Fathi qu'elle va épouser M. Haïd, l'un des membres les plus éminents du gouvernement. Il ne reste donc à Fathi qu'un seul havre où se mettre hors d'atteinte du pouvoir : l'appartement de Lama, sa maîtresse, où leurs deux corps complices s'enlaceront sur le seul territoire qu'il leur reste : l'amour. L'union des corps comme acte de dissidence et ultime liberté. Mais déjà 18 heures sonnent, il est temps de gagner le commissariat. Réconcilié avec la vie grâce à Lama, Fathi rejoint l'hôtel de police. Là, il est renvoyé de service en service, oublié dans une antichambre, jeté dans une cellule d'isolement, ramené à la surface, et de nouveau bringuebalé d'un fonctionnaire à l'autre. Il ne lui reste qu'une arme à opposer à la bureaucratie de ce régime absurde : l'ironie. Comment résister autrement au bruit infernal qui vous dévore l'âme ? Qu'opposer aux menaces contre sa mère ? À la promesse d'être autorisé à publier s'il rentre dans le rang ? Jouant les trouble-fête dans cette farce grinçante qu'est l'existence sous une dictature, Fathi finit par ne plus savoir quand la réalité cède la place au rêve éveillé, puis au cauchemar.
更多信息……
法语 [fr] · PDF · 0.9MB · 2012 · 📕 小说类图书 · 🚀/lgli/zlib · Save
base score: 11058.0, final score: 27.023174
lgli/Nihad Sirees [Sirees, Nihad] - Silence et tumulte (2012, Robert Laffont).epub
Silence et tumulte Nihad Sirees [Sirees, Nihad] Groupe Robert Laffont, 2012
" –; Je vous en supplie, trouvez-moi un nom approprié à ce que nous sommes en train de vivre. –; Un nom approprié ? C'est tout ce que vous attendez de moi ? Surréaliste. C'est ça, le mot qui convient. " Une journée dans la vie de Fathi Chin, écrivain célèbre interdit de publication par le Guide suprême de son pays (un pays arabe qui pourrait être... la Syrie). Une journée à l'absurdité kafkaïenne, où s'exerce la tyrannie très ordinaire d'un régime dictatorial. Ce jour-là, le pays tout entier célèbre par un interminable défilé les vingt ans de pouvoir de son despote. Il fait une chaleur accablante, téléviseurs et haut-parleurs hurlent à plein volume et une énorme masse de citoyens engloutit la ville. Chassé de son lit par le tintamarre, Fathi sort de chez lui pour rendre visite à sa mère. Mais à peine a-t-il franchi le seuil de son appartement qu'il est déjà dans les ennuis : dérogeant à tous ses principes, il porte assistance à un jeune homme tabassé à mort par des miliciens. Sa carte d'identité lui est retirée et il est sommé de se rendre à au commissariat pour la récupérer. En attendant, c'est à ses risques et périls qu'il circule sans papiers dans les rues. Des rues où la foule exaltée par les slogans, abasourdie par le bruit et rendue folle par la chaleur ne se contrôle plus. Qu'importe cependant s'il y a des centaines de victimes, comme cette inconnue que Fathi transporte sur son dos jusqu'à l'hôpital, où viennent s'échouer les vivants et les morts. C'est pour la gloire du maître qu'ils ont donné leur vie, pour le leader qu'ils souffrent. Un leader qui, enfermé dans son palais, passera en boucle, sur les murs de chacune des pièces, les images de cette célébration mortelle. Et si Fathi croyait pouvoir échapper à ce délire organisé en se réfugiant chez sa mère, il se trompait. Car dans sa volonté de gagner à sa cause cet écrivain dissident, le Guide suprême a décidé de s'immiscer jusque dans sa famille : sa mère apprend à Fathi qu'elle va épouser M. Haïd, l'un des membres les plus éminents du gouvernement. Il ne reste donc à Fathi qu'un seul havre où se mettre hors d'atteinte du pouvoir : l'appartement de Lama, sa maîtresse, où leurs deux corps complices s'enlaceront sur le seul territoire qu'il leur reste : l'amour. L'union des corps comme acte de dissidence et ultime liberté. Mais déjà 18 heures sonnent, il est temps de gagner le commissariat. Réconcilié avec la vie grâce à Lama, Fathi rejoint l'hôtel de police. Là, il est renvoyé de service en service, oublié dans une antichambre, jeté dans une cellule d'isolement, ramené à la surface, et de nouveau bringuebalé d'un fonctionnaire à l'autre. Il ne lui reste qu'une arme à opposer à la bureaucratie de ce régime absurde : l'ironie. Comment résister autrement au bruit infernal qui vous dévore l'âme ? Qu'opposer aux menaces contre sa mère ? À la promesse d'être autorisé à publier s'il rentre dans le rang ? Jouant les trouble-fête dans cette farce grinçante qu'est l'existence sous une dictature, Fathi finit par ne plus savoir quand la réalité cède la place au rêve éveillé, puis au cauchemar.
更多信息……
法语 [fr] · EPUB · 0.3MB · 2012 · 📕 小说类图书 · 🚀/lgli/zlib · Save
base score: 11053.0, final score: 27.02173
nexusstc/Resimli Türk Edebiyatı Tarihi 2/cb9effa3ef371862a5aae1597459cc9a.pdf
Resimli Türk Edebiyatı Tarihi 2 Nihad Sami Banarlı Milli Eğitim Yayınları, 2, 1983
Resimli Türk Edebiyatı Tarihi I- II, Nihad Sami Banarlı tarafından kaleme alınmıştır. Kitap 1983 yılında Milli Eğitim Basımevi tarafından [İstanbul] yayınlanmıştır. Resimli Türk Edebiyatı Tarihi I- II adlı eser Türkçe dilindedir.
更多信息……
土耳其语 [tr] · PDF · 44.1MB · 1983 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11060.0, final score: 26.911224
nexusstc/Resimli Türk Edebiyatı Tarihi 1/b7c886f1b18009fe06466c827cabb0e1.pdf
Resimli Türk Edebiyatı Tarihi 1 Nihad Sami Banarlı Milli Eğitim Yayınları, 1, 1983
Resimli Türk Edebiyatı Tarihi I- II, Nihad Sami Banarlı tarafından kaleme alınmıştır. Kitap 1983 yılında Milli Eğitim Basımevi tarafından [İstanbul] yayınlanmıştır. Resimli Türk Edebiyatı Tarihi I- II adlı eser Türkçe dilindedir.
更多信息……
土耳其语 [tr] · PDF · 67.9MB · 1983 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
base score: 11060.0, final score: 26.795969
upload/turkish_pdfs/2860__ . Yeni Türk edebiyatı antolojisi : III : A. Vefik Paşa, E. Nihad, A. Midhat, Ş. Sami, F. Aliye, M. Murad, M. Şemseddin, H. Bedreddin, M. Rifat, Yağcızade A. Nuri . İstanbul Üniversitesi Edebiyat Fakültesi Matbaası ..pdf
. Yeni Türk edebiyatı antolojisi : III : A. Vefik Paşa, E. Nihad, A. Midhat, Ş. Sami, F. Aliye, M. Murad, M. Şemseddin, H. Bedreddin, M. Rifat, Yağcızade A. Nuri . İstanbul Üniversitesi Edebiyat Fakültesi Matbaası .
PDF · 51.3MB · 📗 未知类型的图书 · 🚀/upload · Save
base score: 10949.0, final score: 26.711466
lgli/Nihad Sirees [Sirees, Nihad] - Silence et Tumulte (2012, Éd. Robert Laffont).epub
Silence et Tumulte Nihad Sirees [Sirees, Nihad] Éd. Robert Laffont, 2012
" –; Je vous en supplie, trouvez-moi un nom approprié à ce que nous sommes en train de vivre. –; Un nom approprié ? C'est tout ce que vous attendez de moi ? Surréaliste. C'est ça, le mot qui convient. " Une journée dans la vie de Fathi Chin, écrivain célèbre interdit de publication par le Guide suprême de son pays (un pays arabe qui pourrait être... la Syrie). Une journée à l'absurdité kafkaïenne, où s'exerce la tyrannie très ordinaire d'un régime dictatorial. Ce jour-là, le pays tout entier célèbre par un interminable défilé les vingt ans de pouvoir de son despote. Il fait une chaleur accablante, téléviseurs et haut-parleurs hurlent à plein volume et une énorme masse de citoyens engloutit la ville. Chassé de son lit par le tintamarre, Fathi sort de chez lui pour rendre visite à sa mère. Mais à peine a-t-il franchi le seuil de son appartement qu'il est déjà dans les ennuis : dérogeant à tous ses principes, il porte assistance à un jeune homme tabassé à mort par des miliciens. Sa carte d'identité lui est retirée et il est sommé de se rendre à au commissariat pour la récupérer. En attendant, c'est à ses risques et périls qu'il circule sans papiers dans les rues. Des rues où la foule exaltée par les slogans, abasourdie par le bruit et rendue folle par la chaleur ne se contrôle plus. Qu'importe cependant s'il y a des centaines de victimes, comme cette inconnue que Fathi transporte sur son dos jusqu'à l'hôpital, où viennent s'échouer les vivants et les morts. C'est pour la gloire du maître qu'ils ont donné leur vie, pour le leader qu'ils souffrent. Un leader qui, enfermé dans son palais, passera en boucle, sur les murs de chacune des pièces, les images de cette célébration mortelle. Et si Fathi croyait pouvoir échapper à ce délire organisé en se réfugiant chez sa mère, il se trompait. Car dans sa volonté de gagner à sa cause cet écrivain dissident, le Guide suprême a décidé de s'immiscer jusque dans sa famille : sa mère apprend à Fathi qu'elle va épouser M. Haïd, l'un des membres les plus éminents du gouvernement. Il ne reste donc à Fathi qu'un seul havre où se mettre hors d'atteinte du pouvoir : l'appartement de Lama, sa maîtresse, où leurs deux corps complices s'enlaceront sur le seul territoire qu'il leur reste : l'amour. L'union des corps comme acte de dissidence et ultime liberté. Mais déjà 18 heures sonnent, il est temps de gagner le commissariat. Réconcilié avec la vie grâce à Lama, Fathi rejoint l'hôtel de police. Là, il est renvoyé de service en service, oublié dans une antichambre, jeté dans une cellule d'isolement, ramené à la surface, et de nouveau bringuebalé d'un fonctionnaire à l'autre. Il ne lui reste qu'une arme à opposer à la bureaucratie de ce régime absurde : l'ironie. Comment résister autrement au bruit infernal qui vous dévore l'âme ? Qu'opposer aux menaces contre sa mère ? À la promesse d'être autorisé à publier s'il rentre dans le rang ? Jouant les trouble-fête dans cette farce grinçante qu'est l'existence sous une dictature, Fathi finit par ne plus savoir quand la réalité cède la place au rêve éveillé, puis au cauchemar.
更多信息……
法语 [fr] · EPUB · 0.3MB · 2012 · 📕 小说类图书 · 🚀/lgli/zlib · Save
base score: 11053.0, final score: 26.30327
hathi/chi/pairtree_root/15/98/78/65/15987865/15987865.zip
Les Grecs à Smyrne : nouveaux témoignages sur leurs atrocités, un document officiel probant / [Nihad Rechad]. Rechad, Nihad. Imprimerie Kossuth, 1920., France, 1920
法语 [fr] · ZIP · 0.1MB · 1920 · 📗 未知类型的图书 · 🚀/hathi · Save
base score: 9932.0, final score: 26.211672
upload/bibliotik/T/The Silence and the Roar - Nihad Sirees.epub
The Silence and the Roar : A Novel Sirees, Nihad; Weiss, Max (translator) Other Press, LLC, Penguin Random House LLC (Publisher Services), New York, 2013
The Silence and the Roar takes place in an unnamed Middle Eastern country resembling Syria. The story follows a day in the life of Fathi Chin, an author banned from publishing because he refuses to write propaganda for the ruling government. On this day, the entire country has mobilized to celebrate the twenty year anniversary of the reigning despot. The heat is oppressive and loudspeakers blare as an endless, unbearably loud parade takes over the streets.  Desperate to get away from the noise and the zombie-like masses, Fathi leaves his house to visit his mother, but en route stops to help a student who is being beaten by the police.  Fathi's ID papers are confiscated and he is forced to return home and told to report to the police station before night falls. When Fathi turns himself in, he is led from one department to another in an ever-widening bureaucratic labyrinth. His only weapon against the irrationality of the government employees is his sense of irony. The Silence and the Roar is a funny, sexy, scathing novel about the struggle of an individual over tyranny. Tinged with a Kafkaesque sense of the absurd, it explores what it means to be truly free in mind and body, despite the worst efforts of the state to impose its will on its citizens.
更多信息……
英语 [en] · EPUB · 2.0MB · 2013 · 📕 小说类图书 · 🚀/lgli/lgrs/upload/zlib · Save
base score: 11065.0, final score: 26.156431
lgli/R:\0day\eng\2014-02-08 Part 2-2\Nihad Sirees - The Silence and the Roar (retail) (epub).epub
The Silence and the Roar : A Novel Sirees, Nihad Other Press, LLC, Penguin Random House LLC (Publisher Services), New York, 2013
The Silence and the Roar takes place in an unnamed Middle Eastern country resembling Syria. The story follows a day in the life of Fathi Chin, an author banned from publishing because he refuses to write propaganda for the ruling government. On this day, the entire country has mobilized to celebrate the twenty year anniversary of the reigning despot. The heat is oppressive and loudspeakers blare as an endless, unbearably loud parade takes over the streets.  Desperate to get away from the noise and the zombie-like masses, Fathi leaves his house to visit his mother, but en route stops to help a student who is being beaten by the police.  Fathi's ID papers are confiscated and he is forced to return home and told to report to the police station before night falls. When Fathi turns himself in, he is led from one department to another in an ever-widening bureaucratic labyrinth. His only weapon against the irrationality of the government employees is his sense of irony. The Silence and the Roar is a funny, sexy, scathing novel about the struggle of an individual over tyranny. Tinged with a Kafkaesque sense of the absurd, it explores what it means to be truly free in mind and body, despite the worst efforts of the state to impose its will on its citizens.
更多信息……
英语 [en] · EPUB · 2.0MB · 2013 · 📕 小说类图书 · 🚀/lgli/lgrs/zlib · Save
base score: 11065.0, final score: 26.022417
上一页 1 下一页
上一页 1 下一页
安娜的档案
主页
搜索
捐赠
🧬 SciDB
常问问题
账户
登录 / 注册
账户
公开资料
已下载文件
我的捐赠
Referrals
Explore
活动
代码浏览器
ISBN Visualization ↗
Community Projects ↗
Open data
数据集
种子
大语言模型数据
关注我们
联系邮箱
安娜的博客 ↗
Reddit ↗
Matrix ↗
Help out
改进元数据
志愿服务与悬赏
翻译 ↗
Development
安娜的软件 ↗
安全性
数字千年版权法(DCMA)/ 版权声明
镜像
annas-archive.li ↗
annas-archive.pm ↗
annas-archive.in ↗
SLUM [无关联] ↗
SLUM 2 [无关联] ↗