000 | 08011cam a2201069 a 4500 | ||
---|---|---|---|
001 | ocn799768467 | ||
003 | OCoLC | ||
005 | 20240523125534.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 120716s2012 nju ob 000 0 eng d | ||
010 | _z 2011047198 | ||
040 |
_aEBLCP _beng _epn _cEBLCP _dDG1 _dYDXCP _dN$T _dCDX _dOCLCO _dCOO _dOCLCO _dOCLCQ _dTEFOD _dOCLCF _dDEBSZ _dOCLCO _dOCLCQ _dIEEEE _dTEFOD _dOCLCQ _dDG1 _dLIP _dZCU _dMERUC _dOCLCQ _dCEF _dMUO _dICG _dVTS _dOCLCQ _dINT _dOCLCQ _dYOU _dU3W _dOCLCQ _dDKC _dAU@ _dOCLCQ _dOL$ _dOCLCQ _dUHL _dOCLCQ _dLDP _dSFB _dOCLCQ _dUKAHL _dOCLCO _dOCLCQ _dVI# _dOCLCO _dOCLCL _dOCLCQ |
||
019 |
_a805071189 _a858699726 _a1161687136 |
||
020 |
_a9781118312551 _q(electronic bk.) |
||
020 |
_a1118312554 _q(electronic bk.) |
||
020 |
_a9781118312537 _q(electronic bk.) |
||
020 |
_a1118312538 _q(electronic bk.) |
||
020 | _z1118062418 | ||
020 | _z9781118062418 | ||
020 | _a1118312546 | ||
020 | _a9781118312544 | ||
020 | _a1280998415 | ||
020 | _a9781280998416 | ||
020 | _a9786613770028 | ||
020 | _a6613770027 | ||
024 | 8 | _a9786613770028 | |
024 | 7 |
_a10.1002/9781118312551 _2doi |
|
029 | 1 |
_aAU@ _b000049858911 |
|
029 | 1 |
_aCHNEW _b000940251 |
|
029 | 1 |
_aCHVBK _b480205469 |
|
029 | 1 |
_aDEBBG _bBV044162066 |
|
029 | 1 |
_aDEBSZ _b397235429 |
|
029 | 1 |
_aNZ1 _b14695013 |
|
029 | 1 |
_aNZ1 _b15340854 |
|
029 | 1 |
_aAU@ _b000067501059 |
|
035 |
_a(OCoLC)799768467 _z(OCoLC)805071189 _z(OCoLC)858699726 _z(OCoLC)1161687136 |
||
037 |
_a377002 _bMIL |
||
037 |
_a34298BC4-4E6D-4D1E-8B17-7DBF7E8D0BA7 _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
050 | 4 |
_aTK5105.875.I57 _b.J34 2012 |
|
072 | 7 |
_aCOM _x060040 _2bisacsh |
|
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _222 |
084 |
_aCOM053000 _2bisacsh |
||
049 | _aMAIN | ||
245 | 0 | 4 |
_aThe death of the internet / _cedited by Markus Jakobsson. |
260 |
_aHoboken : _bJohn Wiley & Sons, _c�2012. |
||
300 | _a1 online resource (387 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _2rdaft |
||
505 | 0 | _aTHE DEATH OF THE INTERNET; Contents; Foreword; Preface; Is the Title of this Book a Joke?; Acknowledgments; Contributors; Part I The Problem; 1 What Could Kill the Internet? And so What?; 2 It is About People; 2.1 Human and Social Issues; 2.1.1 Nigerian Scams; 2.1.2 Password Reuse; 2.1.3 Phishing; 2.2 Who are the Criminals?; 2.2.1 Who are they?; 2.2.2 Where are they?; 2.2.3 Deep-Dive: Taking a Look at Ex-Soviet Hackers; 2.2.4 Let's try to Find Parallels in the World we Live in; 2.2.5 Crime and Punishment?; 3 How Criminals Profit; 3.1 Online Advertising Fraud; 3.1.1 Advertising on the Internet. | |
505 | 8 | _a3.1.1.1 Ad serving architecture3.1.1.2 Targeted advertising; 3.1.1.3 Revenue models; 3.1.2 Exploits of Online Advertising Systems; 3.1.2.1 Adversary; 3.1.2.2 Ad Fraud; 3.1.3 Click Fraud; 3.1.3.1 Case study: advertisers scammed by porn sites; 3.1.3.2 Countermeasures to fight click fraud; 3.1.4 Malvertising: Spreading Malware via Ads; 3.1.4.1 Countermeasures to fight malvertising; 3.1.5 Inflight Modification of Ad Traffic; 3.1.5.1 Countermeasures to fight inflight modification of ad traffic; 3.1.6 Adware: Unsolicited Software Ads; 3.1.6.1 Countermeasures to fight adware; 3.1.7 Conclusion. | |
505 | 8 | _a3.2 Toeing the Line: Legal but Deceptive Service Offers3.2.1 How Does it Work?; 3.2.2 What do they Earn?; 3.3 Phishing and Some Related Attacks; 3.3.1 The Problem is the User; 3.3.2 Phishing; 3.3.3 Man-in-the-Middle; 3.3.4 Man-in-the-Browser; 3.3.5 New Attack: Man-in-the-Screen; 3.4 Malware: Current Outlook; 3.4.1 Malware Evolution; 3.4.1.1 Malware categories; 3.4.1.2 Malware example; 3.4.1.3 Polymorphic malware; 3.4.2 Malware Supply and Demand; 3.4.2.1 The malware industry; 3.4.2.2 Malware supply chain; 3.5 Monetization; 3.5.1 There is Money Everywhere; 4 How Things Work and Fail. | |
505 | 8 | _a4.1 Online Advertising: With Secret Security4.1.1 What is a Click?; 4.1.2 How Secret Filters are Evaluated; 4.1.2.1 Third-party click scoring; 4.1.2.2 Ad network check: new filter, old clicks; 4.1.2.3 Ad network check: old filter, new clicks; 4.1.3 What do Fraudsters Know?; 4.2 Web Security Remediation Efforts; 4.2.1 Introduction; 4.2.2 The Multitude of Web Browser Security Mechanisms; 4.2.2.1 Web browser-based built-in security mechanisms; 4.2.2.2 Selectively invocable browser-based security mechanisms; 4.2.2.3 Advanced browser-based web security mechanisms; 4.2.3 Where do we go from Here? | |
505 | 8 | _a4.3 Content-Sniffing XSS Attacks: XSS with Non-HTML Content4.3.1 Introduction; 4.3.2 Content-Sniffing XSS Attacks; 4.3.2.1 Content-sniffing; 4.3.2.2 A detailed view of content-sniffing XSS attacks; 4.3.2.3 Why do mismatches happen?; 4.3.2.4 Finding content-sniffing XSS attacks; 4.3.2.5 Example 1: Under the hood of the HotCRP attack; 4.3.2.6 Example 2: An attack on wikipedia; 4.3.3 Defenses; 4.3.3.1 Server-side defenses; 4.3.3.2 Secure content-sniffing; 4.3.3.3 Adoption; 4.3.4 Conclusion; 4.4 Our Internet Infrastructure at Risk; 4.4.1 Introduction; 4.4.2 The Political Structure. | |
500 | _a4.4.3 The Domain. | ||
520 | _aA holistic look at the vast landscape of Internet security-past, present, and future. A major attack on the Internet could wreak havoc onsociety-bringing down telephony, banking, business, government, media, and the energy grid. This book addresses the growing threats to the Internet from different sources, offering in-depth guidance on how to combat them on both desktop and mobile platforms. Edited by a specialist in holistic security with contributions from experts in industry and academia, The Death of the Internet presents a unique, cross-disciplinary approach to Internet security. It goes beyond computer science to explore its social and psychological components, discussing politically motivated attacks, human error, and criminal tendencies. Geared to non-technical readers and experts alike, the book clearly explains the general concepts of Internet security for managers and decision-makers and provides engineers and industry professionals with detailed instructions on how to develop effective designs with security in mind. | ||
504 | _aIncludes bibliographical references. | ||
588 | 0 | _aPrint version record. | |
546 | _aEnglish. | ||
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 |
_aInternet _xSecurity measures. |
|
650 | 0 |
_aElectronic commerce _xSecurity measures. |
|
650 | 0 | _aData protection. | |
650 | 0 | _aComputer crimes. | |
650 | 6 |
_aInternet _xS�ecurit�e _xMesures. |
|
650 | 6 |
_aCommerce �electronique _xS�ecurit�e _xMesures. |
|
650 | 6 | _aProtection de l'information (Informatique) | |
650 | 6 | _aCriminalit�e informatique. | |
650 | 7 |
_aCOMPUTERS _xInternet _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xNetworking _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh |
|
650 | 7 |
_aComputer crimes _2fast |
|
650 | 7 |
_aData protection _2fast |
|
650 | 7 |
_aElectronic commerce _xSecurity measures _2fast |
|
650 | 7 |
_aInternet _xSecurity measures _2fast |
|
700 | 1 | _aJakobsson, Markus. | |
758 |
_ihas work: _aThe death of the internet (Text) _1https://id.oclc.org/worldcat/entity/E39PCH68HmKDk3FcCTdhfvykrC _4https://id.oclc.org/worldcat/ontology/hasWork |
||
776 | 0 | 8 |
_iPrint version: _z9786613770028 _w(DLC) 2011047198 |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781118312551 |
938 |
_aAskews and Holts Library Services _bASKH _nAH21631944 |
||
938 |
_aCoutts Information Services _bCOUT _n22977842 |
||
938 |
_aProQuest Ebook Central _bEBLB _nEBL848529 |
||
938 |
_aEBSCOhost _bEBSC _n467057 |
||
938 |
_aYBP Library Services _bYANK _n9571129 |
||
938 |
_aYBP Library Services _bYANK _n7657566 |
||
938 |
_aYBP Library Services _bYANK _n12671977 |
||
994 |
_a92 _bINLUM |
||
999 |
_c11799 _d11799 |