Phishing Exposed
Autor Lance James Cuvânt înainte de Dave Jevansen Limba Engleză Paperback – 20 noi 2005
Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today.
This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers.
* Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts
* Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic
* Stay one step ahead of the enemy with all the latest information
Preț: 367.36 lei
Preț vechi: 459.21 lei
-20% Nou
Puncte Express: 551
Preț estimativ în valută:
70.31€ • 73.28$ • 58.53£
70.31€ • 73.28$ • 58.53£
Carte tipărită la comandă
Livrare economică 04-18 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781597490306
ISBN-10: 159749030X
Pagini: 450
Dimensiuni: 178 x 229 x 25 mm
Greutate: 0.73 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 159749030X
Pagini: 450
Dimensiuni: 178 x 229 x 25 mm
Greutate: 0.73 kg
Editura: ELSEVIER SCIENCE
Public țintă
Corporate Security Officers, security professionals, system administrators and even the average user will be engaged by this book as it takes you through a high-tech ride involving an organized criminal enterprise that manipulates the internet through the use of hacking, extortion, money laundering, malware, etc.Cuprins
1 The art of Research
2 Email Effectiveness
3 Where's The Money
4 Lawful Forensics
5 Malware and XSS 5
6 Telephony Exploitation
7.0 Final Analysis
2 Email Effectiveness
3 Where's The Money
4 Lawful Forensics
5 Malware and XSS 5
6 Telephony Exploitation
7.0 Final Analysis