Seven Deadliest Social Network Attacks
Autor Carl Timm, Richard Perezen Limba Engleză Paperback – iun 2010
The book is separated into seven chapters, with each focusing on a specific type of attack that has been furthered with social networking tools and devices. These are: social networking infrastructure attacks; malware attacks; phishing attacks; Evil Twin Attacks; identity theft; cyberbullying; and physical threat. Each chapter takes readers through a detailed overview of a particular attack to demonstrate how it was used, what was accomplished as a result, and the ensuing consequences. In addition to analyzing the anatomy of the attacks, the book offers insights into how to develop mitigation strategies, including forecasts of where these types of attacks are heading.
This book can serve as a reference guide to anyone who is or will be involved in oversight roles within the information security field. It will also benefit those involved or interested in providing defense mechanisms surrounding social media as well as information security professionals at all levels, those in the teaching profession, and recreational hackers.
- Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
- Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
- Institute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable
Preț: 178.10 lei
Preț vechi: 222.62 lei
-20% Nou
Puncte Express: 267
Preț estimativ în valută:
34.09€ • 35.96$ • 28.41£
34.09€ • 35.96$ • 28.41£
Carte tipărită la comandă
Livrare economică 02-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781597495455
ISBN-10: 159749545X
Pagini: 192
Ilustrații: 40 illustrations
Dimensiuni: 191 x 235 x 12 mm
Greutate: 0.4 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 159749545X
Pagini: 192
Ilustrații: 40 illustrations
Dimensiuni: 191 x 235 x 12 mm
Greutate: 0.4 kg
Editura: ELSEVIER SCIENCE
Public țintă
Information security professionals of all levels; recreational hackersCuprins
Introduction Chapter 1. Social Networking Infrastructure Attacks Chapter 2. Malware Attacks Chapter 3. Phishing Attacks Chapter 4. Evil Twin Attacks Chapter 5. Identity Theft Chapter 6. Cyber Bullying Chapter 7. Physical Threats