Cargando…

The death of the internet /

A holistic look at the vast landscape of Internet security-past, present, and future. A major attack on the Internet could wreak havoc onsociety-bringing down telephony, banking, business, government, media, and the energy grid. This book addresses the growing threats to the Internet from different...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Jakobsson, Markus
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken : John Wiley & Sons, ©2012.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn799768467
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cn|||||||||
008 120716s2012 nju ob 000 0 eng d
010 |z  2011047198 
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d DG1  |d YDXCP  |d N$T  |d CDX  |d OCLCO  |d COO  |d OCLCO  |d OCLCQ  |d TEFOD  |d OCLCF  |d DEBSZ  |d OCLCO  |d OCLCQ  |d IEEEE  |d TEFOD  |d OCLCQ  |d DG1  |d LIP  |d ZCU  |d MERUC  |d OCLCQ  |d CEF  |d MUO  |d ICG  |d VTS  |d OCLCQ  |d INT  |d OCLCQ  |d YOU  |d U3W  |d OCLCQ  |d DKC  |d AU@  |d OCLCQ  |d OL$  |d OCLCQ  |d UHL  |d OCLCQ  |d LDP  |d SFB  |d OCLCQ  |d UKAHL  |d OCLCO  |d OCLCQ  |d VI#  |d OCLCO  |d OCLCL  |d OCLCQ 
019 |a 805071189  |a 858699726  |a 1161687136 
020 |a 9781118312551  |q (electronic bk.) 
020 |a 1118312554  |q (electronic bk.) 
020 |a 9781118312537  |q (electronic bk.) 
020 |a 1118312538  |q (electronic bk.) 
020 |z 1118062418 
020 |z 9781118062418 
020 |a 1118312546 
020 |a 9781118312544 
020 |a 1280998415 
020 |a 9781280998416 
020 |a 9786613770028 
020 |a 6613770027 
024 8 |a 9786613770028 
024 7 |a 10.1002/9781118312551  |2 doi 
029 1 |a AU@  |b 000049858911 
029 1 |a CHNEW  |b 000940251 
029 1 |a CHVBK  |b 480205469 
029 1 |a DEBBG  |b BV044162066 
029 1 |a DEBSZ  |b 397235429 
029 1 |a NZ1  |b 14695013 
029 1 |a NZ1  |b 15340854 
029 1 |a AU@  |b 000067501059 
035 |a (OCoLC)799768467  |z (OCoLC)805071189  |z (OCoLC)858699726  |z (OCoLC)1161687136 
037 |a 377002  |b MIL 
037 |a 34298BC4-4E6D-4D1E-8B17-7DBF7E8D0BA7  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.875.I57  |b .J34 2012 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
084 |a COM053000  |2 bisacsh 
049 |a UAMI 
245 0 4 |a The death of the internet /  |c edited by Markus Jakobsson. 
260 |a Hoboken :  |b John Wiley & Sons,  |c ©2012. 
300 |a 1 online resource (387 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rdaft 
505 0 |a THE DEATH OF THE INTERNET; Contents; Foreword; Preface; Is the Title of this Book a Joke?; Acknowledgments; Contributors; Part I The Problem; 1 What Could Kill the Internet? And so What?; 2 It is About People; 2.1 Human and Social Issues; 2.1.1 Nigerian Scams; 2.1.2 Password Reuse; 2.1.3 Phishing; 2.2 Who are the Criminals?; 2.2.1 Who are they?; 2.2.2 Where are they?; 2.2.3 Deep-Dive: Taking a Look at Ex-Soviet Hackers; 2.2.4 Let's try to Find Parallels in the World we Live in; 2.2.5 Crime and Punishment?; 3 How Criminals Profit; 3.1 Online Advertising Fraud; 3.1.1 Advertising on the Internet. 
505 8 |a 3.1.1.1 Ad serving architecture3.1.1.2 Targeted advertising; 3.1.1.3 Revenue models; 3.1.2 Exploits of Online Advertising Systems; 3.1.2.1 Adversary; 3.1.2.2 Ad Fraud; 3.1.3 Click Fraud; 3.1.3.1 Case study: advertisers scammed by porn sites; 3.1.3.2 Countermeasures to fight click fraud; 3.1.4 Malvertising: Spreading Malware via Ads; 3.1.4.1 Countermeasures to fight malvertising; 3.1.5 Inflight Modification of Ad Traffic; 3.1.5.1 Countermeasures to fight inflight modification of ad traffic; 3.1.6 Adware: Unsolicited Software Ads; 3.1.6.1 Countermeasures to fight adware; 3.1.7 Conclusion. 
505 8 |a 3.2 Toeing the Line: Legal but Deceptive Service Offers3.2.1 How Does it Work?; 3.2.2 What do they Earn?; 3.3 Phishing and Some Related Attacks; 3.3.1 The Problem is the User; 3.3.2 Phishing; 3.3.3 Man-in-the-Middle; 3.3.4 Man-in-the-Browser; 3.3.5 New Attack: Man-in-the-Screen; 3.4 Malware: Current Outlook; 3.4.1 Malware Evolution; 3.4.1.1 Malware categories; 3.4.1.2 Malware example; 3.4.1.3 Polymorphic malware; 3.4.2 Malware Supply and Demand; 3.4.2.1 The malware industry; 3.4.2.2 Malware supply chain; 3.5 Monetization; 3.5.1 There is Money Everywhere; 4 How Things Work and Fail. 
505 8 |a 4.1 Online Advertising: With Secret Security4.1.1 What is a Click?; 4.1.2 How Secret Filters are Evaluated; 4.1.2.1 Third-party click scoring; 4.1.2.2 Ad network check: new filter, old clicks; 4.1.2.3 Ad network check: old filter, new clicks; 4.1.3 What do Fraudsters Know?; 4.2 Web Security Remediation Efforts; 4.2.1 Introduction; 4.2.2 The Multitude of Web Browser Security Mechanisms; 4.2.2.1 Web browser-based built-in security mechanisms; 4.2.2.2 Selectively invocable browser-based security mechanisms; 4.2.2.3 Advanced browser-based web security mechanisms; 4.2.3 Where do we go from Here? 
505 8 |a 4.3 Content-Sniffing XSS Attacks: XSS with Non-HTML Content4.3.1 Introduction; 4.3.2 Content-Sniffing XSS Attacks; 4.3.2.1 Content-sniffing; 4.3.2.2 A detailed view of content-sniffing XSS attacks; 4.3.2.3 Why do mismatches happen?; 4.3.2.4 Finding content-sniffing XSS attacks; 4.3.2.5 Example 1: Under the hood of the HotCRP attack; 4.3.2.6 Example 2: An attack on wikipedia; 4.3.3 Defenses; 4.3.3.1 Server-side defenses; 4.3.3.2 Secure content-sniffing; 4.3.3.3 Adoption; 4.3.4 Conclusion; 4.4 Our Internet Infrastructure at Risk; 4.4.1 Introduction; 4.4.2 The Political Structure. 
500 |a 4.4.3 The Domain. 
520 |a A holistic look at the vast landscape of Internet security-past, present, and future. A major attack on the Internet could wreak havoc onsociety-bringing down telephony, banking, business, government, media, and the energy grid. This book addresses the growing threats to the Internet from different sources, offering in-depth guidance on how to combat them on both desktop and mobile platforms. Edited by a specialist in holistic security with contributions from experts in industry and academia, The Death of the Internet presents a unique, cross-disciplinary approach to Internet security. It goes beyond computer science to explore its social and psychological components, discussing politically motivated attacks, human error, and criminal tendencies. Geared to non-technical readers and experts alike, the book clearly explains the general concepts of Internet security for managers and decision-makers and provides engineers and industry professionals with detailed instructions on how to develop effective designs with security in mind. 
504 |a Includes bibliographical references. 
588 0 |a Print version record. 
546 |a English. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Internet  |x Security measures. 
650 0 |a Electronic commerce  |x Security measures. 
650 0 |a Data protection. 
650 0 |a Computer crimes. 
650 6 |a Internet  |x Sécurité  |x Mesures. 
650 6 |a Commerce électronique  |x Sécurité  |x Mesures. 
650 6 |a Protection de l'information (Informatique) 
650 6 |a Criminalité informatique. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer crimes  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Electronic commerce  |x Security measures  |2 fast 
650 7 |a Internet  |x Security measures  |2 fast 
700 1 |a Jakobsson, Markus. 
758 |i has work:  |a The death of the internet (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCH68HmKDk3FcCTdhfvykrC  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |z 9786613770028  |w (DLC) 2011047198 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=848529  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH21631944 
938 |a Coutts Information Services  |b COUT  |n 22977842 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL848529 
938 |a EBSCOhost  |b EBSC  |n 467057 
938 |a YBP Library Services  |b YANK  |n 9571129 
938 |a YBP Library Services  |b YANK  |n 7657566 
938 |a YBP Library Services  |b YANK  |n 12671977 
994 |a 92  |b IZTAP