Fr. 209.00

Cyber Fraud - Tactics, Techniques and Procedures

English · Hardback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more

Zusatztext Written and edited by known experts in the field! the content is indeed of high quality and very informative. The logical structure and writing style are excellent! which is a challenging task when there are so many contributors. The book is a must-read for several reader categories. I strongly recommend some of the technical chapters to advanced undergraduate and graduate computer science students. Law students can use the book to grasp the necessary technical background material for investigating cyber fraud. Finally! it is also for readers who wish to learn about the current state of Internet fraud. For all of these readers! this book is a welcome and rewarding addition to the bookshelf.-Radu State! in Computing Reviews! April 2012 Informationen zum Autor Verisign iDefense Security Intelligence Service, Dulles, Virginia, USA Klappentext Combining the best of investigative journalism and technical analysis! this title documents changes in the culture of cyber criminals and explores the innovations that are the result of those changes. Zusammenfassung With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and sophisticated organizations. Combining investigative journalism and technical analysis, this book documents changes in the culture of cyber criminals and explores the innovations that are the result of those changes. Inhaltsverzeichnis Cyber Fraud: Principles, Trends, and Mitigation Techniques. The Cyber Threat Landscape in Russia. Banking Trojans: An Overview. The Russian Business Network: Rise and Fall of a Criminal ISP. IFrame Attacks - An Examination of the Business of IFrame Exploitation. Inside the World of Money Mules. Preventing Malicious Code from "Phoning Home". Distributed Denial of Service (DDoS) Attacks: Motivations and Methods. Mobile Malicious Code Trends. The Torpig Trojan Exposed. The Laqma Trojan298. BBB: A Threat Analysis of Targeted Spear – Phishing Attacks. Silentbanker Unmuted: An In-Depth Examination of the Silentbaker Trojan Horse. Emerging Economic Models for Software Vulnerability Research. ...

Product details

Authors Rick Howard, Rick (Verisign Idefense Security Intellige Howard, Rick (Verisign iDefense Security Intelligence Services Howard, Howard Rick
Assisted by James Graham (Editor)
Publisher Taylor & Francis Ltd.
 
Languages English
Product format Hardback
Released 27.04.2009
 
EAN 9781420091274
ISBN 978-1-4200-9127-4
No. of pages 520
Subjects Natural sciences, medicine, IT, technology > IT, data processing > Internet

COMPUTERS / Security / General, Computer fraud & hacking, Computer fraud and hacking

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.