Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft

Forside
Markus Jakobsson, Steven Myers
John Wiley & Sons, 5. des. 2006 - 739 sider
2 Anmeldelser
Anmeldelsene blir ikke bekreftet, men Google ser etter falskt innhold og fjerner slikt innhold som avdekkes
Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been mounting over the years, how to detect and prevent current as well as future attacks, this text focuses on corporations who supply the resources used by attackers. The authors subsequently deliberate on what action the government can take to respond to this situation and compare adequate versus inadequate countermeasures.

Inni boken

Hva folk mener - Skriv en omtale

Vi har ikke funnet noen omtaler på noen av de vanlige stedene.

Andre utgaver - Vis alle

Vanlige uttrykk og setninger

Populære avsnitt

Side 642 - ... (1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work.
Side 657 - IRB finds and documents that: 1. the research involves no more than minimal risk to the subjects; 2. the waiver or alteration will not adversely affect the rights and welfare of the subjects; 3. the research could not practicably be carried out without the waiver or alteration; and 4. whenever appropriate, the subjects will be provided with additional pertinent information after participation.
Side 671 - header information" means the source, destination, and routing information attached to an electronic mail message, including the originating domain name and originating electronic mail address, and any other information that appears in the line identifying, or purporting to identify, a person initiating the message.
Side 652 - One who intentionally intrudes, physically or otherwise, upon the solitude or seclusion of another or his private affairs or concerns, is subject to liability to the other for invasion of his privacy, if the intrusion would be highly offensive to a reasonable person.
Side 453 - P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization.
Side 137 - S. Staniford, V. Paxson, and N. Weaver. How to Own the Internet in Your Spare Time.

Om forfatteren (2006)

MARKUS JAKOBSSON, PhD, is Associate Professor in the School of Informatics at Indiana University, where he is also Associate Director of the Center for Applied Cybersecurity Research. Dr. Jakobsson is the former editor of RSA CryptoBytes. He is a noted authority on the subject of phishing and is regularly invited to speak on the topic at conferences and workshops.

STEVEN MYERS, PhD, is Assistant Professor in the School of Informatics at Indiana University and a member of the University's Center for Applied Cybersecurity Research. Dr. Myers worked on secure email anti-phishing technology at Echoworx Corporation, and has written several papers on cryptography, distributed systems, and probabilistic combinatorics.

Bibliografisk informasjon