Hiding from the Internet

Eliminating Personal Online Information

Author: Michael Bazzell

Publisher: Createspace Independent Publishing Platform

ISBN: 9781986621380

Category: Computer crimes

Page: 378

View: 4395

DOWNLOAD NOW »
New 2018 Fourth Edition Take control of your privacy by removing your personal information from the internet with this updated Fourth Edition. Author Michael Bazzell has been well known in government circles for his ability to locate personal information about anyone through the internet. In Hiding from the Internet: Eliminating Personal Online Information, he exposes the resources that broadcast your personal details to public view. He has researched each source and identified the best method to have your private details removed from the databases that store profiles on all of us. This book will serve as a reference guide for anyone that values privacy. Each technique is explained in simple steps. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The author provides personal experiences from his journey to disappear from public view. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to force companies to remove you from their data collection systems. This book exposes loopholes that create unique opportunities for privacy seekers. Among other techniques, you will learn to: Remove your personal information from public databases and people search sites Create free anonymous mail addresses, email addresses, and telephone numbers Control your privacy settings on social networks and remove sensitive data Provide disinformation to conceal true private details Force data brokers to stop sharing your information with both private and public organizations Prevent marketing companies from monitoring your browsing, searching, and shopping habits Remove your landline and cellular telephone numbers from online websites Use a credit freeze to eliminate the worry of financial identity theft and fraud Change your future habits to promote complete privacy and anonymity Conduct a complete background check to verify proper information removal Configure a home firewall with VPN Kill-Switch Purchase a completely invisible home or vehicle

Hiding from the Internet

Eliminating Personal Online Information

Author: Michael Bazzell

Publisher: Createspace Independent Publishing Platform

ISBN: 9781522914907

Category: Computer crimes

Page: 334

View: 5402

DOWNLOAD NOW »
New 2016 Third Edition Take control of your privacy by removing your personal information from the internet with this second edition. Author Michael Bazzell has been well known in government circles for his ability to locate personal information about anyone through the internet. In Hiding from the Internet: Eliminating Personal Online Information, he exposes the resources that broadcast your personal details to public view. He has researched each source and identified the best method to have your private details removed from the databases that store profiles on all of us. This book will serve as a reference guide for anyone that values privacy. Each technique is explained in simple steps. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The author provides personal experiences from his journey to disappear from public view. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to force companies to remove you from their data collection systems. This book exposes loopholes that create unique opportunities for privacy seekers. Among other techniques, you will learn to: Remove your personal information from dozens of public databases and people search websites Create free anonymous mail addresses, email addresses, and telephone numbers Control your privacy settings on social networks and remove sensitive data Provide disinformation to conceal true private details Force data brokers to stop sharing your information with both private and public organizations Prevent marketing companies from monitoring your browsing, searching, and shopping habits Remove your landline and cellular telephone numbers from online websites Use a credit freeze to eliminate the worry of financial identity theft and fraud Change your future habits to promote complete privacy and anonymity Conduct a complete background check to verify proper information removal

Hiding from the Internet

Eliminating Personal Online Information

Author: Michael Bazzell

Publisher: Createspace Independent Pub

ISBN: 9781500397814

Category: Computers

Page: 294

View: 9281

DOWNLOAD NOW »
New 2015 Revision Take control of your privacy by removing your personal information from the internet with this second edition. Author Michael Bazzell has been well known in government circles for his ability to locate personal information about anyone through the internet. In Hiding from the Internet: Eliminating Personal Online Information, he exposes the resources that broadcast your personal details to public view. He has researched each source and identified the best method to have your private details removed from the databases that store profiles on all of us. This book will serve as a reference guide for anyone that values privacy. Each technique is explained in simple steps. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The author provides personal experiences from his journey to disappear from public view. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to force companies to remove you from their data collection systems. This book exposes loopholes that create unique opportunities for privacy seekers. Among other techniques, you will learn to: Remove your personal information from dozens of public databases and people search websites Create free anonymous mail addresses, email addresses, and telephone numbers Control your privacy settings on social networks and remove sensitive data Provide disinformation to conceal true private details Force data brokers to stop sharing your information with both private and public organizations Prevent marketing companies from monitoring your browsing, searching, and shopping habits Remove your landline and cellular telephone numbers from online websites Use a credit freeze to eliminate the worry of financial identity theft and fraud Change your future habits to promote complete privacy and anonymity Conduct a complete background check to verify proper information removal

Open Source Intelligence Techniques

Resources for Searching and Analyzing Online Information

Author: Michael Bazzell

Publisher: Createspace Independent Publishing Platform

ISBN: 9781984201577

Category: Computer security

Page: 476

View: 8553

DOWNLOAD NOW »
Completely Rewritten Sixth Edition Sheds New Light on Open Source Intelligence Collection and Analysis Author Michael Bazzell has been well known in government circles for his ability to locate personal information about any target through Open Source Intelligence (OSINT). In this book, he shares his methods in great detail. Each step of his process is explained throughout twenty-five chapters of specialized websites, software solutions, and creative search techniques. Over 250 resources are identified with narrative tutorials and screen captures. This book will serve as a reference guide for anyone that is responsible for the collection of online content. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The search techniques offered will inspire analysts to "think outside the box" when scouring the internet for personal information. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to use various technologies for an unintended purpose. This book will greatly improve anyone's online investigative skills. Among other techniques, you will learn how to locate: Hidden Social Network Content Cell Phone Subscriber Information Deleted Websites & Posts Missing Facebook Profile Data Full Twitter Account Data Alias Social Network Profiles Free Investigative Software Useful Browser Extensions Alternative Search Engine Results Website Owner Information Photo GPS & Metadata Live Streaming Social Content Social Content by Location IP Addresses of Users Additional User Accounts Sensitive Documents & Photos Private Email Addresses Duplicate Video Posts Mobile App Network Data Unlisted Addresses &#s Public Government Records Document Metadata Rental Vehicle Contracts Online Criminal Activity Personal Radio Communications Compromised Email Information Automated Collection Solutions Linux Investigative Programs Dark Web Content (Tor) Restricted YouTube Content Hidden Website Details Vehicle Registration Details

Open Source Intelligence Methods and Tools

A Practical Guide to Online Intelligence

Author: Nihad A. Hassan,Rami Hijazi

Publisher: Apress

ISBN: 1484232135

Category: Computers

Page: 354

View: 9450

DOWNLOAD NOW »
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web. The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. What You’ll Learn Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organization Use OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackers Gather corporate intelligence about business competitors and predict future market directions Conduct advanced searches to gather intelligence from social media sites such as Facebook and Twitter Understand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs Who This Book Is For Penetration testers, digital forensics investigators, intelligence services, military, law enforcement, UN agencies, and for-profit/non-profit enterprises

How to Find Out Anything

From Extreme Google Searches to Scouring Government Documents, a Guide to Uncovering Anything About Everyone and Everything

Author: Don MacLeod

Publisher: Penguin

ISBN: 1101617349

Category: Reference

Page: 272

View: 9577

DOWNLOAD NOW »
In How to Find Out Anything, master researcher Don MacLeod explains how to find what you're looking for quickly, efficiently, and accurately—and how to avoid the most common mistakes of the Google Age. Not your average research book, How to Find Out Anything shows you how to unveil nearly anything about anyone. From top CEO’s salaries to police records, you’ll learn little-known tricks for discovering the exact information you’re looking for. You’ll learn: •How to really tap the power of Google, and why Google is the best place to start a search, but never the best place to finish it. •The scoop on vast, yet little-known online resources that search engines cannot scour, such as refdesk.com, ipl.org, the University of Michigan Documents Center, and Project Gutenberg, among many others. •How to access free government resources (and put your tax dollars to good use). •How to find experts and other people with special knowledge. •How to dig up seemingly confidential information on people and businesses, from public and private companies to non-profits and international companies. Whether researching for a term paper or digging up dirt on an ex, the advice in this book arms you with the sleuthing skills to tackle any mystery.

The Complete Privacy & Security Desk Reference

Digital

Author: Michael Bazzell,Justin Carroll

Publisher: Createspace Independent Publishing Platform

ISBN: 9781522778905

Category:

Page: 492

View: 2639

DOWNLOAD NOW »
This 500-page textbook will explain how to become digitally invisible. You will make all of your communications private, data encrypted, internet connections anonymous, computers hardened, identity guarded, purchases secret, accounts secured, devices locked, and home address hidden. You will remove all personal information from public view and will reclaim your right to privacy. You will no longer give away your intimate details and you will take yourself out of 'the system'. You will use covert aliases and misinformation to eliminate current and future threats toward your privacy & security. When taken to the extreme, you will be impossible to compromise.

Personal Digital Security

Protecting Yourself from Online Crime

Author: Michael Bazzell

Publisher: Createspace Independent Pub

ISBN: 9781491081976

Category: Computers

Page: 240

View: 1513

DOWNLOAD NOW »
Your complete resource to protect you, your family, and your community from digital crimeEvery day, thousands of digital crimes are facilitated over the internet. Years ago, this meant that a criminal needed specialized computer skill, a dedicated computer for hacking, and an expensive internet connection. Today, the entire instruction one needs can be found on Google, the attacks can be conducted over a cell phone, and there is free wireless internet on practically every corner. Author Michael Bazzell will walk you through his experiences during his career fighting digital crime. This book includes explicit details of his entire training program created for individuals, employees, and company leaders. For the first time his complete repository of free resources has been assembled in one place. Combined with his website, this book offers you everything needed to build an effective defense from electronic crime.The personal solutions for stopping digital attacks that are provided here will prevent you from becoming a victim. The author will make you aware of how the crimes occur, explain how you can eliminate your risk of attack, and how to easily create awareness in your circles about this growing problem. A few of the many lessons detailed here that can decrease your exposure to digital crime include how to:Protect your computer with free softwareRemove malicious programs from any systemCreate and test strong password policiesProtect your email accounts from online attacksAvoid financial scams over the internetConfigure an effective data backup solutionEncrypt sensitive data on all devicesRecover deleted data from a computerProtect your credit report and financial accountsImplement a credit freeze for ID theft protectionAvoid devices that steal your card informationProtect smart phones from the latest exploitsPrevent attacks through landline telephonesDiscover compromised devices on your networkProtect yourself during public Wi-Fi useSecure your wireless networks and devicesProtect your children from the latest threatsAnalyze computer usage and internet historyIdentify and monitor an online presenceInstruct others on personal digital security

Hacking Web Intelligence

Open Source Intelligence and Web Reconnaissance Concepts and Techniques

Author: Sudhanshu Chauhan,Nutan Kumar Panda

Publisher: Syngress

ISBN: 0128019123

Category: Computers

Page: 300

View: 406

DOWNLOAD NOW »
Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment—that is, reconnaissance—is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods. Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more. Provides a holistic approach to OSINT and Web recon, showing you how to fit all the data together into actionable intelligence Focuses on hands-on tools such as TOR, i2p, Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, FOCA, EXIF, Metagoofil, MAT, and many more Covers key technical topics such as metadata searching, advanced browsers and power searching, online anonymity, Darkweb / Deepweb, Social Network Analysis (SNA), and how to manage, analyze, and visualize the data you gather Includes hands-on technical examples and case studies, as well as a Python chapter that shows you how to create your own information-gathering tools and modify existing APIs

How to Disappear

Erase Your Digital Footprint, Leave False Trails, and Vanish without a Trace

Author: Frank Ahearn,Eileen Horan

Publisher: Rowman & Littlefield

ISBN: 0762766735

Category: Reference

Page: 208

View: 9342

DOWNLOAD NOW »
How to Disappear is the authoritative and comprehensive guide for people who seek to protect their privacy as well as for anyone who’s ever entertained the fantasy of disappearing—whether actually dropping out of sight or by eliminating the traceable evidence of their existence. Written by the world’s leading experts on finding people and helping people avoid being found, How to Disappear covers everything from tools for disappearing to discovering and eliminating the nearly invisible tracks and clues we tend to leave wherever we go. Learn the three keys to disappearing, all about your electronic footprints, the dangers and opportunities of social networking sites, and how to disappear from a stalker. Frank Ahearn and Eileen Horan provide field-tested methods for maintaining privacy, as well as tactics and strategies for protecting personal information and preventing identity theft. They explain and illustrate key tactics such as misinformation (destroying all the data known about you); disinformation (creating fake trails); and, finally, reformation—the act of getting you from point A to point B without leaving clues. Ahearn illustrates every step with real-life stories of his fascinating career, from undercover work to nab thieving department store employees to a stint as a private investigator; and, later, as a career “skip tracer” who finds people who don’t want to be found. In 1997, when news broke of President Bill Clinton’s dalliance with a White House intern, Ahearn was hired to find her. When Oscar statuettes were stolen in Beverly Hills, Ahearn pinpointed a principal in the caper to help solve the case. When Russell Crowe threw a telephone at a hotel clerk in 2005, Ahearn located the victim and hid him from the media. An indispensable resource not just for those determined to become utterly anonymous, but also for just about anyone in the brave new world of on-line information, How to Disappear sums up Ahearn’s dual philosophy: Don’t break the law, but know how to protect yourself.

Social Engineering

The Art of Human Hacking

Author: Christopher Hadnagy

Publisher: John Wiley & Sons

ISBN: 1118029712

Category: Computers

Page: 416

View: 7343

DOWNLOAD NOW »
The first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Kevin Mitnick—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats. Examines social engineering, the science of influencing a target to perform a desired task or divulge information Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access Reveals vital steps for preventing social engineering threats Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers—now you can do your part by putting to good use the critical information within its pages.

The Tao of Open Source Intelligence

Author: Stewart Bertram

Publisher: IT Governance Ltd

ISBN: 1849287295

Category: Computers

Page: 137

View: 7402

DOWNLOAD NOW »
OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for numerous practices, including within the criminal investigation community.The Tao of Open Source Intelligence is your guide to the cutting edge of this information collection capability.

World Without Mind

The Existential Threat of Big Tech

Author: Franklin Foer

Publisher: Penguin

ISBN: 1101981113

Category: HISTORY

Page: 257

View: 6000

DOWNLOAD NOW »
Elegantly tracing the intellectual history of computer science, Foer puts the DNA of the very idea of "tech" under the microscope. Google, Facebook, Apple, and Amazon, he argues, are breaking laws intended to protect intellectual property and privacy. This is not the path towards freedom and prosperity, but the total automation and homogenization of our social, political, and intellectual lives. Today's corporate giants want access to every facet of our identities and influence over every corner of our lives. Foer both indicts these companies, and shapes a path towards reining them in.

Outsmarting Your Kids Online

A Safety Handbook for Overwhelmed Parents

Author: Amber Mac,Michael Bazzell

Publisher: Ambermac Media, Incorporated

ISBN: 9780692682692

Category:

Page: 202

View: 7179

DOWNLOAD NOW »
In this book, tech expert Amber Mac and Internet security expert Michael Bazzell provide the ultimate handbook for parenting in today's digital world. From understanding social media concerns to learning about tomorrow's technology trends; this book empowers overwhelmed parents to make smarter online decisions to properly protect their kids.

The Complete Windows 10 Privacy Guide

Fall Creators Update

Author: Martin Brinkmann

Publisher: Createspace Independent Publishing Platform

ISBN: 9781978104723

Category:

Page: 302

View: 9480

DOWNLOAD NOW »
Privacy is a hot topic in today's connected world. This is true especially when it comes to user tracking on the Internet, but also tracking built-in to operating systems such as Windows 10 or Android, or programs such as Google Chrome or Mozilla Firefox. Windows 10 has probably been the operating system that Microsoft has been attacked the most for from privacy advocates and concerned users in regards to privacy and data collection. Probably the biggest factors for this are changes made to Telemetry collecting on the operating system, a lack of transparency when it comes to the collecting of data, and a lack of distinction between data that Microsoft collects, and data that is required by services or applications for functionality. Questions about which data is collected when Windows 10 is used, why it is collected, where it is stored, and how it is used or shared, are not answered to the satisfaction of privacy advocates or users who are concerned about privacy. The Complete Windows 10 Privacy Guide answers these questions. It explains which data Microsoft collects and why it collects the data. It lists privacy settings exposed in the Windows UI, and provides the most complete list of Group Policy and Registry settings related to privacy as well for access to features that are not exposed in Settings. The guide explains privacy settings during setup, comes with a 5-minute quick guide to apply the most important settings directly, and in-depth explanations of privacy settings of the Windows 10 operating system. The Complete Windows 10 Privacy Guide helps Home users and system administrators who deploy Windows 10 in larger scale. "Privacy has never been an easy topic and Windows privacy draws attacks from all sides. That's why it's more important now than ever to understand exactly what Windows does with your information - and what you can do to reduce the snooping, while keeping the features that you really want. Brinkmann's book is a watershed event in documenting Windows privacy settings, with in-depth information you won't find anywhere else." (Woody Leonhard, Infoworld / Ask Woody). "The book contains the most complete Registry entries and group policy collection about Windows 10 privacy I've seen so far ..." (G�nter Born, Windows book author)

The Art of Invisibility

The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

Author: Kevin Mitnick

Publisher: Little, Brown

ISBN: 0316380490

Category: Computers

Page: 320

View: 7309

DOWNLOAD NOW »
Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions. Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity. Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. The world's most famous--and formerly the US government's most wanted--computer hacker, he has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point was on a three-year run from the FBI. Now Mitnick is reformed and widely regarded as the expert on the subject of computer security. Invisibility isn't just for superheroes--privacy is a power you deserve and need in the age of Big Brother and Big Data.

Complete Guide to Internet Privacy, Anonymity & Security

Author: Matthew Bailey

Publisher: Nerel Online

ISBN: 9783950309348

Category: Computer security

Page: 260

View: 2774

DOWNLOAD NOW »
Fully updated and revised, this leading guide on Internet privacy, anonymity and security contains all the practical information you need to inform and protect yourself. In this comprehensive yet easy-to-read guide for Windows users, you will quickly learn how to: stop search engines, social media and other powerful Internet players from tracking and profiling your online activities gain unrestricted access to all the content and downloads the Internet has to offer use social media to stay connected with friends in ways that don't compromise your privacy or safety keep hackers, identity thieves and adversaries from gaining access to your computer use the best (and often free!) privacy, anonymity and security apps that really work mask your IP address with a proxy, The Onion Router (Tor) or a virtual private network (VPN) use encryption to keep your digital items, downloads and personal information completely hidden and safe prevent surveillance and the monitoring of your activities by Internet service providers (ISP), governments, adversaries and other unwelcome snoops enjoy all the benefits (and downloads) of torrent file-sharing and Usenet newsgroups while staying protected and anonymous get rid of trace and hidden data on your computer that exposes your private activities conduct checks on how private your online activities and devices really are From your small investment in this book, you will benefit for years to come. After all, your privacy and security are priceless.

Automating Open Source Intelligence

Algorithms for OSINT

Author: Robert Layton,Paul A Watters

Publisher: Syngress

ISBN: 012802917X

Category: Computers

Page: 222

View: 5398

DOWNLOAD NOW »
Algorithms for Automating Open Source Intelligence (OSINT) presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As OSINT has applications in crime fighting, state-based intelligence, and social research, this book provides recent advances in text mining, web crawling, and other algorithms that have led to advances in methods that can largely automate this process. The book is beneficial to both practitioners and academic researchers, with discussions of the latest advances in applications, a coherent set of methods and processes for automating OSINT, and interdisciplinary perspectives on the key problems identified within each discipline. Drawing upon years of practical experience and using numerous examples, editors Robert Layton, Paul Watters, and a distinguished list of contributors discuss Evidence Accumulation Strategies for OSINT, Named Entity Resolution in Social Media, Analyzing Social Media Campaigns for Group Size Estimation, Surveys and qualitative techniques in OSINT, and Geospatial reasoning of open data. Presents a coherent set of methods and processes for automating OSINT Focuses on algorithms and applications allowing the practitioner to get up and running quickly Includes fully developed case studies on the digital underground and predicting crime through OSINT Discusses the ethical considerations when using publicly available online data

The Guide to Online Due Diligence Investigations

The Professional Approach on How to Use Traditional and Social Media Resources

Author: Cynthia Hetherington

Publisher: N.A

ISBN: 9781889150611

Category: Business & Economics

Page: 348

View: 6064

DOWNLOAD NOW »
Just when you thought there was nothing new to learn, the author has created the most concise investigative guide to business intelligence and the social media. This powerful resource contains useful insights and proven successful techniques the reader can apply immediately. Step-by-step examples coupled with proven strategies and a detailed practical approach all lead to achieving better results. Hetherington's methods appeal to and educate readers at all levels of expertise.