|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocn799768467 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
120716s2012 nju ob 000 0 eng d |
010 |
|
|
|z 2011047198
|
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d DG1
|d YDXCP
|d N$T
|d CDX
|d OCLCO
|d COO
|d OCLCO
|d OCLCQ
|d TEFOD
|d OCLCF
|d DEBSZ
|d OCLCO
|d OCLCQ
|d IEEEE
|d TEFOD
|d OCLCQ
|d DG1
|d LIP
|d ZCU
|d MERUC
|d OCLCQ
|d CEF
|d MUO
|d ICG
|d VTS
|d OCLCQ
|d INT
|d OCLCQ
|d YOU
|d U3W
|d OCLCQ
|d DKC
|d AU@
|d OCLCQ
|d OL$
|d OCLCQ
|d UHL
|d OCLCQ
|d LDP
|d SFB
|d OCLCQ
|d UKAHL
|d OCLCO
|d OCLCQ
|d VI#
|d OCLCO
|d OCLCL
|d OCLCQ
|
019 |
|
|
|a 805071189
|a 858699726
|a 1161687136
|
020 |
|
|
|a 9781118312551
|q (electronic bk.)
|
020 |
|
|
|a 1118312554
|q (electronic bk.)
|
020 |
|
|
|a 9781118312537
|q (electronic bk.)
|
020 |
|
|
|a 1118312538
|q (electronic bk.)
|
020 |
|
|
|z 1118062418
|
020 |
|
|
|z 9781118062418
|
020 |
|
|
|a 1118312546
|
020 |
|
|
|a 9781118312544
|
020 |
|
|
|a 1280998415
|
020 |
|
|
|a 9781280998416
|
020 |
|
|
|a 9786613770028
|
020 |
|
|
|a 6613770027
|
024 |
8 |
|
|a 9786613770028
|
024 |
7 |
|
|a 10.1002/9781118312551
|2 doi
|
029 |
1 |
|
|a AU@
|b 000049858911
|
029 |
1 |
|
|a CHNEW
|b 000940251
|
029 |
1 |
|
|a CHVBK
|b 480205469
|
029 |
1 |
|
|a DEBBG
|b BV044162066
|
029 |
1 |
|
|a DEBSZ
|b 397235429
|
029 |
1 |
|
|a NZ1
|b 14695013
|
029 |
1 |
|
|a NZ1
|b 15340854
|
029 |
1 |
|
|a AU@
|b 000067501059
|
035 |
|
|
|a (OCoLC)799768467
|z (OCoLC)805071189
|z (OCoLC)858699726
|z (OCoLC)1161687136
|
037 |
|
|
|a 377002
|b MIL
|
037 |
|
|
|a 34298BC4-4E6D-4D1E-8B17-7DBF7E8D0BA7
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a TK5105.875.I57
|b .J34 2012
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
084 |
|
|
|a COM053000
|2 bisacsh
|
049 |
|
|
|a UAMI
|
245 |
0 |
4 |
|a The death of the internet /
|c edited by Markus Jakobsson.
|
260 |
|
|
|a Hoboken :
|b John Wiley & Sons,
|c ©2012.
|
300 |
|
|
|a 1 online resource (387 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|2 rdaft
|
505 |
0 |
|
|a THE DEATH OF THE INTERNET; Contents; Foreword; Preface; Is the Title of this Book a Joke?; Acknowledgments; Contributors; Part I The Problem; 1 What Could Kill the Internet? And so What?; 2 It is About People; 2.1 Human and Social Issues; 2.1.1 Nigerian Scams; 2.1.2 Password Reuse; 2.1.3 Phishing; 2.2 Who are the Criminals?; 2.2.1 Who are they?; 2.2.2 Where are they?; 2.2.3 Deep-Dive: Taking a Look at Ex-Soviet Hackers; 2.2.4 Let's try to Find Parallels in the World we Live in; 2.2.5 Crime and Punishment?; 3 How Criminals Profit; 3.1 Online Advertising Fraud; 3.1.1 Advertising on the Internet.
|
505 |
8 |
|
|a 3.1.1.1 Ad serving architecture3.1.1.2 Targeted advertising; 3.1.1.3 Revenue models; 3.1.2 Exploits of Online Advertising Systems; 3.1.2.1 Adversary; 3.1.2.2 Ad Fraud; 3.1.3 Click Fraud; 3.1.3.1 Case study: advertisers scammed by porn sites; 3.1.3.2 Countermeasures to fight click fraud; 3.1.4 Malvertising: Spreading Malware via Ads; 3.1.4.1 Countermeasures to fight malvertising; 3.1.5 Inflight Modification of Ad Traffic; 3.1.5.1 Countermeasures to fight inflight modification of ad traffic; 3.1.6 Adware: Unsolicited Software Ads; 3.1.6.1 Countermeasures to fight adware; 3.1.7 Conclusion.
|
505 |
8 |
|
|a 3.2 Toeing the Line: Legal but Deceptive Service Offers3.2.1 How Does it Work?; 3.2.2 What do they Earn?; 3.3 Phishing and Some Related Attacks; 3.3.1 The Problem is the User; 3.3.2 Phishing; 3.3.3 Man-in-the-Middle; 3.3.4 Man-in-the-Browser; 3.3.5 New Attack: Man-in-the-Screen; 3.4 Malware: Current Outlook; 3.4.1 Malware Evolution; 3.4.1.1 Malware categories; 3.4.1.2 Malware example; 3.4.1.3 Polymorphic malware; 3.4.2 Malware Supply and Demand; 3.4.2.1 The malware industry; 3.4.2.2 Malware supply chain; 3.5 Monetization; 3.5.1 There is Money Everywhere; 4 How Things Work and Fail.
|
505 |
8 |
|
|a 4.1 Online Advertising: With Secret Security4.1.1 What is a Click?; 4.1.2 How Secret Filters are Evaluated; 4.1.2.1 Third-party click scoring; 4.1.2.2 Ad network check: new filter, old clicks; 4.1.2.3 Ad network check: old filter, new clicks; 4.1.3 What do Fraudsters Know?; 4.2 Web Security Remediation Efforts; 4.2.1 Introduction; 4.2.2 The Multitude of Web Browser Security Mechanisms; 4.2.2.1 Web browser-based built-in security mechanisms; 4.2.2.2 Selectively invocable browser-based security mechanisms; 4.2.2.3 Advanced browser-based web security mechanisms; 4.2.3 Where do we go from Here?
|
505 |
8 |
|
|a 4.3 Content-Sniffing XSS Attacks: XSS with Non-HTML Content4.3.1 Introduction; 4.3.2 Content-Sniffing XSS Attacks; 4.3.2.1 Content-sniffing; 4.3.2.2 A detailed view of content-sniffing XSS attacks; 4.3.2.3 Why do mismatches happen?; 4.3.2.4 Finding content-sniffing XSS attacks; 4.3.2.5 Example 1: Under the hood of the HotCRP attack; 4.3.2.6 Example 2: An attack on wikipedia; 4.3.3 Defenses; 4.3.3.1 Server-side defenses; 4.3.3.2 Secure content-sniffing; 4.3.3.3 Adoption; 4.3.4 Conclusion; 4.4 Our Internet Infrastructure at Risk; 4.4.1 Introduction; 4.4.2 The Political Structure.
|
500 |
|
|
|a 4.4.3 The Domain.
|
520 |
|
|
|a A holistic look at the vast landscape of Internet security-past, present, and future. A major attack on the Internet could wreak havoc onsociety-bringing down telephony, banking, business, government, media, and the energy grid. This book addresses the growing threats to the Internet from different sources, offering in-depth guidance on how to combat them on both desktop and mobile platforms. Edited by a specialist in holistic security with contributions from experts in industry and academia, The Death of the Internet presents a unique, cross-disciplinary approach to Internet security. It goes beyond computer science to explore its social and psychological components, discussing politically motivated attacks, human error, and criminal tendencies. Geared to non-technical readers and experts alike, the book clearly explains the general concepts of Internet security for managers and decision-makers and provides engineers and industry professionals with detailed instructions on how to develop effective designs with security in mind.
|
504 |
|
|
|a Includes bibliographical references.
|
588 |
0 |
|
|a Print version record.
|
546 |
|
|
|a English.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
0 |
|a Electronic commerce
|x Security measures.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer crimes.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Commerce électronique
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Criminalité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer crimes
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Electronic commerce
|x Security measures
|2 fast
|
650 |
|
7 |
|a Internet
|x Security measures
|2 fast
|
700 |
1 |
|
|a Jakobsson, Markus.
|
758 |
|
|
|i has work:
|a The death of the internet (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCH68HmKDk3FcCTdhfvykrC
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|z 9786613770028
|w (DLC) 2011047198
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=848529
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH21631944
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 22977842
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL848529
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 467057
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 9571129
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7657566
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12671977
|
994 |
|
|
|a 92
|b IZTAP
|