- 5 resultaten
laagste prijs: € 21,85, hoogste prijs: € 151,53, gemiddelde prijs: € 104,44
1
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic - Steven Myers, Markus Jakobsson
bestellen
bij
A$ 234,29
(ongeveer € 141,71)
verzending: € 40,681
bestellenGesponsorde link
Steven Myers, Markus Jakobsson:

Phishing and Countermeasures: Understanding the Increasing Problem of Electronic - gebonden uitgave, pocketboek

ISBN: 9780471782452

Introduction to Phishing. 1.1 What is Phishing?. 1.2 A Brief History of Phishing. 1.3 The Costs to Society of Phishing. 1.4 A Typical Phishing Attack. 1.4.3 Making The Lure Convincing. 1.… Meer...

98.3, Zahlungsarten: Paypal, APPLE_PAY, Google Pay, Visa, Mastercard, American Express, Priority Listing. Verzendingskosten:Versand zum Fixpreis, [SHT: None], 3*** Melbourne, [TO: Worldwide] (EUR 40.68) the_nile
2
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic - Steven Myers, Markus Jakobsson
bestellen
bij
C$ 208,71
(ongeveer € 141,60)
verzending: € 40,651
bestellenGesponsorde link

Steven Myers, Markus Jakobsson:

Phishing and Countermeasures: Understanding the Increasing Problem of Electronic - gebonden uitgave, pocketboek

ISBN: 9780471782452

The Nile on eBay   Phishing and Countermeasures by Markus Jakobsson, Steven Myers Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective cou… Meer...

98.3, Zahlungsarten: Paypal, APPLE_PAY, Google Pay, Visa, Mastercard, American Express, Priority Listing. Verzendingskosten:Versand zum Fixpreis, [SHT: None], 3*** Melbourne, [TO: Worldwide] (EUR 40.65) the_nile
3
Phishing y contramedidas: comprender el creciente problema de la electrónica - Steven Myers, Markus Jakobsson
bestellen
bij
€ 151,53
verzending: € 43,501
bestellenGesponsorde link
Steven Myers, Markus Jakobsson:
Phishing y contramedidas: comprender el creciente problema de la electrónica - gebonden uitgave, pocketboek

ISBN: 9780471782452

Introduction to Phishing. 1.1 What is Phishing?. 1.2 A Brief History of Phishing. 1.3 The Costs to Society of Phishing. 1.4 A Typical Phishing Attack. 1.4.3 Making The Lure Convincing. 1.… Meer...

98.3, Zahlungsarten: Paypal, APPLE_PAY, Google Pay, Visa, Mastercard, American Express, Priority Listing. Verzendingskosten:Versand zum Fixpreis, [SHT: None], 3*** Melbourne, [TO: Todo el mundo] (EUR 43.50) the_nile
4
Phishing and Countermeasures : Understanding the Increasing Problem of Electronic Identity Theft
bestellen
bij BetterWorldBooks.com
€ 21,85
bestellenGesponsorde link
Phishing and Countermeasures : Understanding the Increasing Problem of Electronic Identity Theft - gebruikt boek

ISBN: 9780471782452

"This book is the encyclopedia of phishing. It provides views from the payment, human, and technical perspectives. The material is remarkably readable--each chapter is contributed by an e… Meer...

used in stock. Verzendingskosten:zzgl. Versandkosten., exclusief verzendingskosten
5
bestellen
bij AbeBooks.de
€ 65,53
verzending: € 40,331
bestellenGesponsorde link
PHISHING AND COUNTERMEASURES: UN - gebonden uitgave, pocketboek

2006, ISBN: 0471782459

[EAN: 9780471782452], Neubuch, [PU: Wiley-Interscience], New. In shrink wrap. Looks like an interesting title!, Books

NEW BOOK. Verzendingskosten: EUR 40.33 BennettBooksLtd, LOS ANGELES, CA, U.S.A. [52101753] [Rating: 4 (von 5)]

1Aangezien sommige platformen geen verzendingsvoorwaarden meedelen en deze kunnen afhangen van het land van levering, de aankoopprijs, het gewicht en de grootte van het artikel, een eventueel lidmaatschap van het platform, een rechtstreekse levering door het platform of via een derde aanbieder (Marktplaats), enz., is het mogelijk dat de door euro-boek.nl meegedeelde verzendingskosten niet overeenstemmen met deze van het aanbiedende platform.

Bibliografische gegevens van het best passende boek

Bijzonderheden over het boek
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft

"This book is the encyclopedia of phishing. It provides views from the payment, human, and technical perspectives. The material is remarkably readable--each chapter is contributed by an expert on that topic, but none require specialized background on the part of the reader. The text will be useful for any professional who seeks to understand phishing." --Directors of the International Financial Cryptography Association (IFCA) Phishing attacks, or the practice of deceiving people into revealing sensitive data on a computer system, continue to mount. Here is the information you need to understand how phishing works, how to detect it, and how to prevent it. Phishing and Countermeasures begins with a technical introduction to the problem, setting forth the tools and techniques that phishers use, along with current security technology and countermeasures that are used to thwart them. Readers are not only introduced to current techniques of phishing, but also to emerging and future threats and the countermeasures that will be needed to stop them. The potential and limitations of all countermeasures presented in the text are explored in detail. In spite of the fact that phishing attacks constantly evolve, much of the material in this book will remain valid, given that the book covers the general principles as much as actual instances of phishing. While delving into a myriad of countermeasures and defense strategies, the authors also focus on the role of the user in preventing phishing attacks. The authors assert that countermeasures often fail not for technical reasons, but rather because users are unable or unwilling to use them. In response, the authors present a number of countermeasures that are simple for users to implement, or that can be activated without a user's direct participation. Moreover, the authors propose strategies for educating users. The text concludes with a discussion of how researchers and security professionals can ethically and legally perform phishing experiments to test the effectiveness of their defense strategies against the strength of current and future attacks. Each chapter of the book features an extensive bibliography to help readers explore individual topics in greater depth. With phishing becoming an ever-growing threat, the strategies presented in this text are vital for technical managers, engineers, and security professionals tasked with protecting users from unwittingly giving out sensitive data. It is also recommended as a textbook for students in computer science and informatics.

Gedetalleerde informatie over het boek. - Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft


EAN (ISBN-13): 9780471782452
ISBN (ISBN-10): 0471782459
Gebonden uitgave
pocket book
Verschijningsjaar: 2006
Uitgever: Wiley-Interscience
700 Bladzijden
Gewicht: 1,157 kg
Taal: eng/Englisch

Boek bevindt zich in het datenbestand sinds 2007-06-05T15:25:33+02:00 (Amsterdam)
Detailpagina laatst gewijzigd op 2024-03-13T16:42:25+01:00 (Amsterdam)
ISBN/EAN: 0471782459

ISBN - alternatieve schrijfwijzen:
0-471-78245-9, 978-0-471-78245-2
alternatieve schrijfwijzen en verwante zoekwoorden:
Auteur van het boek: markus lüpertz, jakobs, john myers, markus jakob
Titel van het boek: phishing and countermeasures, markus lüpertz, understanding identity, theft, problem sin, phish, measure understanding, the problem identity


Gegevens van de uitgever

Auteur: Markus Jakobsson
Titel: Phishing and Countermeasures - Understanding the Increasing Problem of Electronic Identity Theft
Uitgeverij: John Wiley & Sons
736 Bladzijden
Verschijningsjaar: 2007-01-09
Gewicht: 1,163 kg
Taal: Engels
129,00 € (DE)
165mm x 237mm x 41mm

BB; Hardcover, Softcover / Technik/Elektronik, Elektrotechnik, Nachrichtentechnik; Nachrichtententechnik, Telekommunikation; Communication System Security; Computer Science; Computersicherheit; Electrical & Electronics Engineering; Elektrotechnik u. Elektronik; Informatik; Networking / Security; Netzwerke / Sicherheit; Netzwerksicherheit; Programmierung / Benutzeroberflächen; Programming / User Interface Design; Sicherheit in Kommunikationssystemen; Netzwerke / Sicherheit; Programmierung / Benutzeroberflächen; Sicherheit in Kommunikationssystemen

Preface. Acknowledgements. 1. Introduction to Phishing. 1.1 What is Phishing? 1.2 A Brief History of Phishing. 1.3 The Costs to Society of Phishing. 1.4 A Typical Phishing Attack. 1.5 Evolution of Phishing. 1.6 Case Study: Phishing on Froogle. 1.7 Protecting Users from Phishing. References. 2. Phishing Attacks: Information Flow and Chokepoints. 2.1 Types of Phishing Attacks. 2.2 Technology, Chokepoints and Countermeasures. References. 3. Spoofing and Countermeasures. 3.1 Email Spoofing. 3.2 IP Spoofing. 3.3 Homograph Attacks Using Unicode. 3.4 Simulated Browser Attack. 3.5 Case Study: Warning the User About Active Web Spoofing. References. 4. Pharming and Client Side Attacks. 4.1 Malware. 4.2 Malware Defense Strategies. 4.3 Pharming. 4.4 Case Study: Pharming with Appliances. 4.5 Case Study: Race-Pharming. References. 5. Status Quo Security Tools. 5.1 An overview of Anti-Spam Techniques. 5.2 Public Key Cryptography and its Infrastructure. 5.3 SSL Without a PKI. 5.4 Honeypots. References. 6. Adding Context to Phishing Attacks: Spear Phishing. 6.1 Overview of Context Aware Phishing. 6.2 Modeling Phishing Attacks. 6.3 Case Study: Automated Trawling for Public Private Data. 6.4 Case Study: Using Your Social Network Against You. 6.5 Case Study: Browser Recon Attacks. 6.6 Case Study: Using the Autofill feature in Phishing. 6.7 Case Study: Acoustic Keyboard Emanations. References. 7. Human-Centered Design Considerations. 7.1 Introduction: The Human Context of Phishing and Online Security. 7.2 Understanding and Designing for Users. 7.3 Mis-Education. References. 8. Passwords. 8.1 Traditional Passwords. 8.2 Case Study: Phishing in Germany. 8.3 Security Questions as Password Reset Mechanisms. 8.4 One-Time Password Tokens. References. 9. Mutual Authentication and Trusted Pathways. 9.1 The Need for Reliable Mutual Authentication. 9.2 Password Authenticated Key Exchange. 9.3 Delayed Password Disclosure. 9.4 Trusted Path: How To Find Trust in an Unscrupulous World. 9.5 Dynamic Security Skins. 9.6 Browser Enhancements for Preventing Phishing. References. 10. Biometrics and Authentication. 10.1 Biometrics. 10.2 Hardware Tokens for Authentication and Authorization. 10.3 Trusted Computing Platforms and Secure Operating Systems. 10.4 Secure Dongles and PDAs. 10.5 Cookies for Authentication. 10.6 Lightweight Email Signatures. References. 11. Making Takedown Difficult. 11.1 Detection and Takedown. References. 12. Protecting Browser State. 12.1 Client-Side Protection of Browser State. 12.2 Server-Side Protection of Browser State. References. 13. Browser Toolbars. 13.1 Browser-Based Anti-Phishing Tools. 13.2 Do Browser Toolbars Actually Prevent Phishing? References. 14. Social Networks. 14.1 The Role of Trust Online. 14.2 Existing Solutions for Securing Trust Online. 14.3 Case Study: "Net Trust". 14.4 The Risk of Social Networks. References. 15. Microsoft's Anti-Phishing Technologies and Tactics. 15.1 Cutting The Bait: SmartScreen Detection of Email Spam and Scams. 15.2 Cutting The Hook: Dynamic Protection Within the Web Browser. 15.3 Prescriptive Guidance and Education for Users. 15.4 Ongoing Collaboration, Education and Innovation. References. 16. Using S/MIME. 16.1 Secure Electronic Mail: A Brief History. 16.2 Amazon.com's Experience with S/MIME. 16.3 Signatures Without Sealing. 16.4 Conclusions and Recommendations. References. 17. Experimental evaluation of attacks and countermeasures. 17.1 Behavioral Studies. 17.2 Case Study: Attacking eBay Users with Queries. 17.3 Case Study: Signed Applets. 17.4 Case Study: Ethically Studying Man in the Middle. 17.5 Legal Considerations in Phishing Research. 17.6 Case Study: Designing and Conducting Phishing Experiments. References. 18. Liability for Phishing. 18.1 Impersonation. 18.2 Obtaining Personal Information. 18.3 Exploiting Personal Information. References. 19. The Future. Index. About the Editors.

Andere boeken die eventueel grote overeenkomsten met dit boek kunnen hebben:

Laatste soortgelijke boek:
9780470086100 Phishing and Countermeasures Understanding the Increasing Problem of Electronic Identity Theft (Jakobsson, Markus; Myers, Steven)


< naar Archief...