NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

The death of the internet / (Record no. 11799)

MARC details
000 -LEADER
fixed length control field 08011cam a2201069 a 4500
001 - CONTROL NUMBER
control field ocn799768467
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240523125534.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120716s2012 nju ob 000 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
Canceled/invalid LC control number 2011047198
040 ## - CATALOGING SOURCE
Original cataloging agency EBLCP
Language of cataloging eng
Description conventions pn
Transcribing agency EBLCP
Modifying agency DG1
-- YDXCP
-- N$T
-- CDX
-- OCLCO
-- COO
-- OCLCO
-- OCLCQ
-- TEFOD
-- OCLCF
-- DEBSZ
-- OCLCO
-- OCLCQ
-- IEEEE
-- TEFOD
-- OCLCQ
-- DG1
-- LIP
-- ZCU
-- MERUC
-- OCLCQ
-- CEF
-- MUO
-- ICG
-- VTS
-- OCLCQ
-- INT
-- OCLCQ
-- YOU
-- U3W
-- OCLCQ
-- DKC
-- AU@
-- OCLCQ
-- OL$
-- OCLCQ
-- UHL
-- OCLCQ
-- LDP
-- SFB
-- OCLCQ
-- UKAHL
-- OCLCO
-- OCLCQ
-- VI#
-- OCLCO
-- OCLCL
-- OCLCQ
019 ## -
-- 805071189
-- 858699726
-- 1161687136
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118312551
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1118312554
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118312537
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1118312538
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1118062418
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781118062418
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1118312546
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118312544
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1280998415
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781280998416
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9786613770028
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 6613770027
024 8# - OTHER STANDARD IDENTIFIER
Standard number or code 9786613770028
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1002/9781118312551
Source of number or code doi
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000049858911
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHNEW
System control number 000940251
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHVBK
System control number 480205469
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBBG
System control number BV044162066
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBSZ
System control number 397235429
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier NZ1
System control number 14695013
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier NZ1
System control number 15340854
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000067501059
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)799768467
Canceled/invalid control number (OCoLC)805071189
-- (OCoLC)858699726
-- (OCoLC)1161687136
037 ## - SOURCE OF ACQUISITION
Stock number 377002
Source of stock number/acquisition MIL
037 ## - SOURCE OF ACQUISITION
Stock number 34298BC4-4E6D-4D1E-8B17-7DBF7E8D0BA7
Source of stock number/acquisition OverDrive, Inc.
Note http://www.overdrive.com
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.875.I57
Item number .J34 2012
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 060040
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 043050
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
084 ## - OTHER CLASSIFICATION NUMBER
Classification number COM053000
Number source bisacsh
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
245 04 - TITLE STATEMENT
Title The death of the internet /
Statement of responsibility, etc. edited by Markus Jakobsson.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Hoboken :
Name of publisher, distributor, etc. John Wiley & Sons,
Date of publication, distribution, etc. �2012.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (387 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Source rdaft
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note THE DEATH OF THE INTERNET; Contents; Foreword; Preface; Is the Title of this Book a Joke?; Acknowledgments; Contributors; Part I The Problem; 1 What Could Kill the Internet? And so What?; 2 It is About People; 2.1 Human and Social Issues; 2.1.1 Nigerian Scams; 2.1.2 Password Reuse; 2.1.3 Phishing; 2.2 Who are the Criminals?; 2.2.1 Who are they?; 2.2.2 Where are they?; 2.2.3 Deep-Dive: Taking a Look at Ex-Soviet Hackers; 2.2.4 Let's try to Find Parallels in the World we Live in; 2.2.5 Crime and Punishment?; 3 How Criminals Profit; 3.1 Online Advertising Fraud; 3.1.1 Advertising on the Internet.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3.1.1.1 Ad serving architecture3.1.1.2 Targeted advertising; 3.1.1.3 Revenue models; 3.1.2 Exploits of Online Advertising Systems; 3.1.2.1 Adversary; 3.1.2.2 Ad Fraud; 3.1.3 Click Fraud; 3.1.3.1 Case study: advertisers scammed by porn sites; 3.1.3.2 Countermeasures to fight click fraud; 3.1.4 Malvertising: Spreading Malware via Ads; 3.1.4.1 Countermeasures to fight malvertising; 3.1.5 Inflight Modification of Ad Traffic; 3.1.5.1 Countermeasures to fight inflight modification of ad traffic; 3.1.6 Adware: Unsolicited Software Ads; 3.1.6.1 Countermeasures to fight adware; 3.1.7 Conclusion.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3.2 Toeing the Line: Legal but Deceptive Service Offers3.2.1 How Does it Work?; 3.2.2 What do they Earn?; 3.3 Phishing and Some Related Attacks; 3.3.1 The Problem is the User; 3.3.2 Phishing; 3.3.3 Man-in-the-Middle; 3.3.4 Man-in-the-Browser; 3.3.5 New Attack: Man-in-the-Screen; 3.4 Malware: Current Outlook; 3.4.1 Malware Evolution; 3.4.1.1 Malware categories; 3.4.1.2 Malware example; 3.4.1.3 Polymorphic malware; 3.4.2 Malware Supply and Demand; 3.4.2.1 The malware industry; 3.4.2.2 Malware supply chain; 3.5 Monetization; 3.5.1 There is Money Everywhere; 4 How Things Work and Fail.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4.1 Online Advertising: With Secret Security4.1.1 What is a Click?; 4.1.2 How Secret Filters are Evaluated; 4.1.2.1 Third-party click scoring; 4.1.2.2 Ad network check: new filter, old clicks; 4.1.2.3 Ad network check: old filter, new clicks; 4.1.3 What do Fraudsters Know?; 4.2 Web Security Remediation Efforts; 4.2.1 Introduction; 4.2.2 The Multitude of Web Browser Security Mechanisms; 4.2.2.1 Web browser-based built-in security mechanisms; 4.2.2.2 Selectively invocable browser-based security mechanisms; 4.2.2.3 Advanced browser-based web security mechanisms; 4.2.3 Where do we go from Here?
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4.3 Content-Sniffing XSS Attacks: XSS with Non-HTML Content4.3.1 Introduction; 4.3.2 Content-Sniffing XSS Attacks; 4.3.2.1 Content-sniffing; 4.3.2.2 A detailed view of content-sniffing XSS attacks; 4.3.2.3 Why do mismatches happen?; 4.3.2.4 Finding content-sniffing XSS attacks; 4.3.2.5 Example 1: Under the hood of the HotCRP attack; 4.3.2.6 Example 2: An attack on wikipedia; 4.3.3 Defenses; 4.3.3.1 Server-side defenses; 4.3.3.2 Secure content-sniffing; 4.3.3.3 Adoption; 4.3.4 Conclusion; 4.4 Our Internet Infrastructure at Risk; 4.4.1 Introduction; 4.4.2 The Political Structure.
500 ## - GENERAL NOTE
General note 4.4.3 The Domain.
520 ## - SUMMARY, ETC.
Summary, etc. A holistic look at the vast landscape of Internet security-past, present, and future. A major attack on the Internet could wreak havoc onsociety-bringing down telephony, banking, business, government, media, and the energy grid. This book addresses the growing threats to the Internet from different sources, offering in-depth guidance on how to combat them on both desktop and mobile platforms. Edited by a specialist in holistic security with contributions from experts in industry and academia, The Death of the Internet presents a unique, cross-disciplinary approach to Internet security. It goes beyond computer science to explore its social and psychological components, discussing politically motivated attacks, human error, and criminal tendencies. Geared to non-technical readers and experts alike, the book clearly explains the general concepts of Internet security for managers and decision-makers and provides engineers and industry professionals with detailed instructions on how to develop effective designs with security in mind.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references.
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Print version record.
546 ## - LANGUAGE NOTE
Language note English.
590 ## - LOCAL NOTE (RLIN)
Local note John Wiley and Sons
Provenance (VM) [OBSOLETE] Wiley Online Library: Complete oBooks
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Electronic commerce
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet
General subdivision S�ecurit�e
-- Mesures.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Commerce �electronique
General subdivision S�ecurit�e
-- Mesures.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Protection de l'information (Informatique)
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Criminalit�e informatique.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS
General subdivision Internet
-- Security.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS
General subdivision Networking
-- Security.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS
General subdivision Security
-- General.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Electronic commerce
General subdivision Security measures
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet
General subdivision Security measures
Source of heading or term fast
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Jakobsson, Markus.
758 ## - RESOURCE IDENTIFIER
Relationship information has work:
Label The death of the internet (Text)
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCH68HmKDk3FcCTdhfvykrC
Relationship https://id.oclc.org/worldcat/ontology/hasWork
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9786613770028
Record control number (DLC) 2011047198
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781118312551">https://onlinelibrary.wiley.com/doi/book/10.1002/9781118312551</a>
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH21631944
938 ## -
-- Coutts Information Services
-- COUT
-- 22977842
938 ## -
-- ProQuest Ebook Central
-- EBLB
-- EBL848529
938 ## -
-- EBSCOhost
-- EBSC
-- 467057
938 ## -
-- YBP Library Services
-- YANK
-- 9571129
938 ## -
-- YBP Library Services
-- YANK
-- 7657566
938 ## -
-- YBP Library Services
-- YANK
-- 12671977
994 ## -
-- 92
-- INLUM

No items available.