Phishing and Countermeasures: Understanding the Increasing Problem of Electronic - edition reliée, livre de poche
ISBN: 9780471782452
Introduction to Phishing. 1.1 What is Phishing?. 1.2 A Brief History of Phishing. 1.3 The Costs to Society of Phishing. 1.4 A Typical Phishing Attack. 1.4.3 Making The Lure Convincing. 1.… Plus…
the_nile 98.3, Zahlungsarten: Paypal, APPLE_PAY, Google Pay, Visa, Mastercard, American Express, Priority Listing. Frais d'envoiVersand zum Fixpreis, [SHT: None], 3*** Melbourne, [TO: Worldwide] (EUR 40.68) Details... |
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic - edition reliée, livre de poche
ISBN: 9780471782452
The Nile on eBay Phishing and Countermeasures by Markus Jakobsson, Steven Myers Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective cou… Plus…
the_nile 98.3, Zahlungsarten: Paypal, APPLE_PAY, Google Pay, Visa, Mastercard, American Express, Priority Listing. Frais d'envoiVersand zum Fixpreis, [SHT: None], 3*** Melbourne, [TO: Worldwide] (EUR 40.65) Details... |
Phishing y contramedidas: comprender el creciente problema de la electrónica - edition reliée, livre de poche
ISBN: 9780471782452
Introduction to Phishing. 1.1 What is Phishing?. 1.2 A Brief History of Phishing. 1.3 The Costs to Society of Phishing. 1.4 A Typical Phishing Attack. 1.4.3 Making The Lure Convincing. 1.… Plus…
the_nile 98.3, Zahlungsarten: Paypal, APPLE_PAY, Google Pay, Visa, Mastercard, American Express, Priority Listing. Frais d'envoiVersand zum Fixpreis, [SHT: None], 3*** Melbourne, [TO: Todo el mundo] (EUR 43.50) Details... |
ISBN: 9780471782452
"This book is the encyclopedia of phishing. It provides views from the payment, human, and technical perspectives. The material is remarkably readable--each chapter is contributed by an e… Plus…
BetterWorldBooks.com used in stock. Frais d'envoizzgl. Versandkosten., Livraison non-comprise Details... |
2006, ISBN: 0471782459
[EAN: 9780471782452], Neubuch, [PU: Wiley-Interscience], New. In shrink wrap. Looks like an interesting title!, Books
AbeBooks.de BennettBooksLtd, LOS ANGELES, CA, U.S.A. [52101753] [Rating: 4 (von 5)] NEW BOOK. Frais d'envoi EUR 40.33 Details... |
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic - edition reliée, livre de poche
ISBN: 9780471782452
Introduction to Phishing. 1.1 What is Phishing?. 1.2 A Brief History of Phishing. 1.3 The Costs to Society of Phishing. 1.4 A Typical Phishing Attack. 1.4.3 Making The Lure Convincing. 1.… Plus…
Steven Myers, Markus Jakobsson:
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic - edition reliée, livre de pocheISBN: 9780471782452
The Nile on eBay Phishing and Countermeasures by Markus Jakobsson, Steven Myers Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective cou… Plus…
Phishing y contramedidas: comprender el creciente problema de la electrónica - edition reliée, livre de poche
ISBN: 9780471782452
Introduction to Phishing. 1.1 What is Phishing?. 1.2 A Brief History of Phishing. 1.3 The Costs to Society of Phishing. 1.4 A Typical Phishing Attack. 1.4.3 Making The Lure Convincing. 1.… Plus…
ISBN: 9780471782452
"This book is the encyclopedia of phishing. It provides views from the payment, human, and technical perspectives. The material is remarkably readable--each chapter is contributed by an e… Plus…
2006, ISBN: 0471782459
[EAN: 9780471782452], Neubuch, [PU: Wiley-Interscience], New. In shrink wrap. Looks like an interesting title!, Books
Données bibliographiques du meilleur livre correspondant
Auteur: | |
Titre: | |
ISBN: |
Informations détaillées sur le livre - Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft
EAN (ISBN-13): 9780471782452
ISBN (ISBN-10): 0471782459
Version reliée
Livre de poche
Date de parution: 2006
Editeur: Wiley-Interscience
700 Pages
Poids: 1,157 kg
Langue: eng/Englisch
Livre dans la base de données depuis 2007-06-05T15:25:33+02:00 (Paris)
Page de détail modifiée en dernier sur 2024-03-13T16:42:25+01:00 (Paris)
ISBN/EAN: 9780471782452
ISBN - Autres types d'écriture:
0-471-78245-9, 978-0-471-78245-2
Autres types d'écriture et termes associés:
Auteur du livre: markus lüpertz, jakobs, john myers, markus jakob
Titre du livre: phishing and countermeasures, markus lüpertz, understanding identity, theft, problem sin, phish, measure understanding, the problem identity
Données de l'éditeur
Auteur: Markus Jakobsson
Titre: Phishing and Countermeasures - Understanding the Increasing Problem of Electronic Identity Theft
Editeur: John Wiley & Sons
736 Pages
Date de parution: 2007-01-09
Poids: 1,163 kg
Langue: Anglais
129,00 € (DE)
165mm x 237mm x 41mm
BB; Hardcover, Softcover / Technik/Elektronik, Elektrotechnik, Nachrichtentechnik; Nachrichtententechnik, Telekommunikation; Communication System Security; Computer Science; Computersicherheit; Electrical & Electronics Engineering; Elektrotechnik u. Elektronik; Informatik; Networking / Security; Netzwerke / Sicherheit; Netzwerksicherheit; Programmierung / Benutzeroberflächen; Programming / User Interface Design; Sicherheit in Kommunikationssystemen; Netzwerke / Sicherheit; Programmierung / Benutzeroberflächen; Sicherheit in Kommunikationssystemen
Preface. Acknowledgements. 1. Introduction to Phishing. 1.1 What is Phishing? 1.2 A Brief History of Phishing. 1.3 The Costs to Society of Phishing. 1.4 A Typical Phishing Attack. 1.5 Evolution of Phishing. 1.6 Case Study: Phishing on Froogle. 1.7 Protecting Users from Phishing. References. 2. Phishing Attacks: Information Flow and Chokepoints. 2.1 Types of Phishing Attacks. 2.2 Technology, Chokepoints and Countermeasures. References. 3. Spoofing and Countermeasures. 3.1 Email Spoofing. 3.2 IP Spoofing. 3.3 Homograph Attacks Using Unicode. 3.4 Simulated Browser Attack. 3.5 Case Study: Warning the User About Active Web Spoofing. References. 4. Pharming and Client Side Attacks. 4.1 Malware. 4.2 Malware Defense Strategies. 4.3 Pharming. 4.4 Case Study: Pharming with Appliances. 4.5 Case Study: Race-Pharming. References. 5. Status Quo Security Tools. 5.1 An overview of Anti-Spam Techniques. 5.2 Public Key Cryptography and its Infrastructure. 5.3 SSL Without a PKI. 5.4 Honeypots. References. 6. Adding Context to Phishing Attacks: Spear Phishing. 6.1 Overview of Context Aware Phishing. 6.2 Modeling Phishing Attacks. 6.3 Case Study: Automated Trawling for Public Private Data. 6.4 Case Study: Using Your Social Network Against You. 6.5 Case Study: Browser Recon Attacks. 6.6 Case Study: Using the Autofill feature in Phishing. 6.7 Case Study: Acoustic Keyboard Emanations. References. 7. Human-Centered Design Considerations. 7.1 Introduction: The Human Context of Phishing and Online Security. 7.2 Understanding and Designing for Users. 7.3 Mis-Education. References. 8. Passwords. 8.1 Traditional Passwords. 8.2 Case Study: Phishing in Germany. 8.3 Security Questions as Password Reset Mechanisms. 8.4 One-Time Password Tokens. References. 9. Mutual Authentication and Trusted Pathways. 9.1 The Need for Reliable Mutual Authentication. 9.2 Password Authenticated Key Exchange. 9.3 Delayed Password Disclosure. 9.4 Trusted Path: How To Find Trust in an Unscrupulous World. 9.5 Dynamic Security Skins. 9.6 Browser Enhancements for Preventing Phishing. References. 10. Biometrics and Authentication. 10.1 Biometrics. 10.2 Hardware Tokens for Authentication and Authorization. 10.3 Trusted Computing Platforms and Secure Operating Systems. 10.4 Secure Dongles and PDAs. 10.5 Cookies for Authentication. 10.6 Lightweight Email Signatures. References. 11. Making Takedown Difficult. 11.1 Detection and Takedown. References. 12. Protecting Browser State. 12.1 Client-Side Protection of Browser State. 12.2 Server-Side Protection of Browser State. References. 13. Browser Toolbars. 13.1 Browser-Based Anti-Phishing Tools. 13.2 Do Browser Toolbars Actually Prevent Phishing? References. 14. Social Networks. 14.1 The Role of Trust Online. 14.2 Existing Solutions for Securing Trust Online. 14.3 Case Study: "Net Trust". 14.4 The Risk of Social Networks. References. 15. Microsoft's Anti-Phishing Technologies and Tactics. 15.1 Cutting The Bait: SmartScreen Detection of Email Spam and Scams. 15.2 Cutting The Hook: Dynamic Protection Within the Web Browser. 15.3 Prescriptive Guidance and Education for Users. 15.4 Ongoing Collaboration, Education and Innovation. References. 16. Using S/MIME. 16.1 Secure Electronic Mail: A Brief History. 16.2 Amazon.com's Experience with S/MIME. 16.3 Signatures Without Sealing. 16.4 Conclusions and Recommendations. References. 17. Experimental evaluation of attacks and countermeasures. 17.1 Behavioral Studies. 17.2 Case Study: Attacking eBay Users with Queries. 17.3 Case Study: Signed Applets. 17.4 Case Study: Ethically Studying Man in the Middle. 17.5 Legal Considerations in Phishing Research. 17.6 Case Study: Designing and Conducting Phishing Experiments. References. 18. Liability for Phishing. 18.1 Impersonation. 18.2 Obtaining Personal Information. 18.3 Exploiting Personal Information. References. 19. The Future. Index. About the Editors.Autres livres qui pourraient ressembler au livre recherché:
Dernier livre similaire:
9780470086100 Phishing and Countermeasures Understanding the Increasing Problem of Electronic Identity Theft (Jakobsson, Markus; Myers, Steven)
< pour archiver...