Read more
Zusatztext Written and edited by known experts in the field! the content is indeed of high quality and very informative. The logical structure and writing style are excellent! which is a challenging task when there are so many contributors. The book is a must-read for several reader categories. I strongly recommend some of the technical chapters to advanced undergraduate and graduate computer science students. Law students can use the book to grasp the necessary technical background material for investigating cyber fraud. Finally! it is also for readers who wish to learn about the current state of Internet fraud. For all of these readers! this book is a welcome and rewarding addition to the bookshelf.-Radu State! in Computing Reviews! April 2012 Informationen zum Autor Verisign iDefense Security Intelligence Service, Dulles, Virginia, USA Klappentext Combining the best of investigative journalism and technical analysis! this title documents changes in the culture of cyber criminals and explores the innovations that are the result of those changes. Zusammenfassung With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and sophisticated organizations. Combining investigative journalism and technical analysis, this book documents changes in the culture of cyber criminals and explores the innovations that are the result of those changes. Inhaltsverzeichnis Cyber Fraud: Principles, Trends, and Mitigation Techniques. The Cyber Threat Landscape in Russia. Banking Trojans: An Overview. The Russian Business Network: Rise and Fall of a Criminal ISP. IFrame Attacks - An Examination of the Business of IFrame Exploitation. Inside the World of Money Mules. Preventing Malicious Code from "Phoning Home". Distributed Denial of Service (DDoS) Attacks: Motivations and Methods. Mobile Malicious Code Trends. The Torpig Trojan Exposed. The Laqma Trojan298. BBB: A Threat Analysis of Targeted Spear – Phishing Attacks. Silentbanker Unmuted: An In-Depth Examination of the Silentbaker Trojan Horse. Emerging Economic Models for Software Vulnerability Research. ...