000 08011cam a2201069 a 4500
001 ocn799768467
003 OCoLC
005 20240523125534.0
006 m o d
007 cr cn|||||||||
008 120716s2012 nju ob 000 0 eng d
010 _z 2011047198
040 _aEBLCP
_beng
_epn
_cEBLCP
_dDG1
_dYDXCP
_dN$T
_dCDX
_dOCLCO
_dCOO
_dOCLCO
_dOCLCQ
_dTEFOD
_dOCLCF
_dDEBSZ
_dOCLCO
_dOCLCQ
_dIEEEE
_dTEFOD
_dOCLCQ
_dDG1
_dLIP
_dZCU
_dMERUC
_dOCLCQ
_dCEF
_dMUO
_dICG
_dVTS
_dOCLCQ
_dINT
_dOCLCQ
_dYOU
_dU3W
_dOCLCQ
_dDKC
_dAU@
_dOCLCQ
_dOL$
_dOCLCQ
_dUHL
_dOCLCQ
_dLDP
_dSFB
_dOCLCQ
_dUKAHL
_dOCLCO
_dOCLCQ
_dVI#
_dOCLCO
_dOCLCL
_dOCLCQ
019 _a805071189
_a858699726
_a1161687136
020 _a9781118312551
_q(electronic bk.)
020 _a1118312554
_q(electronic bk.)
020 _a9781118312537
_q(electronic bk.)
020 _a1118312538
_q(electronic bk.)
020 _z1118062418
020 _z9781118062418
020 _a1118312546
020 _a9781118312544
020 _a1280998415
020 _a9781280998416
020 _a9786613770028
020 _a6613770027
024 8 _a9786613770028
024 7 _a10.1002/9781118312551
_2doi
029 1 _aAU@
_b000049858911
029 1 _aCHNEW
_b000940251
029 1 _aCHVBK
_b480205469
029 1 _aDEBBG
_bBV044162066
029 1 _aDEBSZ
_b397235429
029 1 _aNZ1
_b14695013
029 1 _aNZ1
_b15340854
029 1 _aAU@
_b000067501059
035 _a(OCoLC)799768467
_z(OCoLC)805071189
_z(OCoLC)858699726
_z(OCoLC)1161687136
037 _a377002
_bMIL
037 _a34298BC4-4E6D-4D1E-8B17-7DBF7E8D0BA7
_bOverDrive, Inc.
_nhttp://www.overdrive.com
050 4 _aTK5105.875.I57
_b.J34 2012
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_222
084 _aCOM053000
_2bisacsh
049 _aMAIN
245 0 4 _aThe death of the internet /
_cedited by Markus Jakobsson.
260 _aHoboken :
_bJohn Wiley & Sons,
_c�2012.
300 _a1 online resource (387 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_2rdaft
505 0 _aTHE DEATH OF THE INTERNET; Contents; Foreword; Preface; Is the Title of this Book a Joke?; Acknowledgments; Contributors; Part I The Problem; 1 What Could Kill the Internet? And so What?; 2 It is About People; 2.1 Human and Social Issues; 2.1.1 Nigerian Scams; 2.1.2 Password Reuse; 2.1.3 Phishing; 2.2 Who are the Criminals?; 2.2.1 Who are they?; 2.2.2 Where are they?; 2.2.3 Deep-Dive: Taking a Look at Ex-Soviet Hackers; 2.2.4 Let's try to Find Parallels in the World we Live in; 2.2.5 Crime and Punishment?; 3 How Criminals Profit; 3.1 Online Advertising Fraud; 3.1.1 Advertising on the Internet.
505 8 _a3.1.1.1 Ad serving architecture3.1.1.2 Targeted advertising; 3.1.1.3 Revenue models; 3.1.2 Exploits of Online Advertising Systems; 3.1.2.1 Adversary; 3.1.2.2 Ad Fraud; 3.1.3 Click Fraud; 3.1.3.1 Case study: advertisers scammed by porn sites; 3.1.3.2 Countermeasures to fight click fraud; 3.1.4 Malvertising: Spreading Malware via Ads; 3.1.4.1 Countermeasures to fight malvertising; 3.1.5 Inflight Modification of Ad Traffic; 3.1.5.1 Countermeasures to fight inflight modification of ad traffic; 3.1.6 Adware: Unsolicited Software Ads; 3.1.6.1 Countermeasures to fight adware; 3.1.7 Conclusion.
505 8 _a3.2 Toeing the Line: Legal but Deceptive Service Offers3.2.1 How Does it Work?; 3.2.2 What do they Earn?; 3.3 Phishing and Some Related Attacks; 3.3.1 The Problem is the User; 3.3.2 Phishing; 3.3.3 Man-in-the-Middle; 3.3.4 Man-in-the-Browser; 3.3.5 New Attack: Man-in-the-Screen; 3.4 Malware: Current Outlook; 3.4.1 Malware Evolution; 3.4.1.1 Malware categories; 3.4.1.2 Malware example; 3.4.1.3 Polymorphic malware; 3.4.2 Malware Supply and Demand; 3.4.2.1 The malware industry; 3.4.2.2 Malware supply chain; 3.5 Monetization; 3.5.1 There is Money Everywhere; 4 How Things Work and Fail.
505 8 _a4.1 Online Advertising: With Secret Security4.1.1 What is a Click?; 4.1.2 How Secret Filters are Evaluated; 4.1.2.1 Third-party click scoring; 4.1.2.2 Ad network check: new filter, old clicks; 4.1.2.3 Ad network check: old filter, new clicks; 4.1.3 What do Fraudsters Know?; 4.2 Web Security Remediation Efforts; 4.2.1 Introduction; 4.2.2 The Multitude of Web Browser Security Mechanisms; 4.2.2.1 Web browser-based built-in security mechanisms; 4.2.2.2 Selectively invocable browser-based security mechanisms; 4.2.2.3 Advanced browser-based web security mechanisms; 4.2.3 Where do we go from Here?
505 8 _a4.3 Content-Sniffing XSS Attacks: XSS with Non-HTML Content4.3.1 Introduction; 4.3.2 Content-Sniffing XSS Attacks; 4.3.2.1 Content-sniffing; 4.3.2.2 A detailed view of content-sniffing XSS attacks; 4.3.2.3 Why do mismatches happen?; 4.3.2.4 Finding content-sniffing XSS attacks; 4.3.2.5 Example 1: Under the hood of the HotCRP attack; 4.3.2.6 Example 2: An attack on wikipedia; 4.3.3 Defenses; 4.3.3.1 Server-side defenses; 4.3.3.2 Secure content-sniffing; 4.3.3.3 Adoption; 4.3.4 Conclusion; 4.4 Our Internet Infrastructure at Risk; 4.4.1 Introduction; 4.4.2 The Political Structure.
500 _a4.4.3 The Domain.
520 _aA holistic look at the vast landscape of Internet security-past, present, and future. A major attack on the Internet could wreak havoc onsociety-bringing down telephony, banking, business, government, media, and the energy grid. This book addresses the growing threats to the Internet from different sources, offering in-depth guidance on how to combat them on both desktop and mobile platforms. Edited by a specialist in holistic security with contributions from experts in industry and academia, The Death of the Internet presents a unique, cross-disciplinary approach to Internet security. It goes beyond computer science to explore its social and psychological components, discussing politically motivated attacks, human error, and criminal tendencies. Geared to non-technical readers and experts alike, the book clearly explains the general concepts of Internet security for managers and decision-makers and provides engineers and industry professionals with detailed instructions on how to develop effective designs with security in mind.
504 _aIncludes bibliographical references.
588 0 _aPrint version record.
546 _aEnglish.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aInternet
_xSecurity measures.
650 0 _aElectronic commerce
_xSecurity measures.
650 0 _aData protection.
650 0 _aComputer crimes.
650 6 _aInternet
_xS�ecurit�e
_xMesures.
650 6 _aCommerce �electronique
_xS�ecurit�e
_xMesures.
650 6 _aProtection de l'information (Informatique)
650 6 _aCriminalit�e informatique.
650 7 _aCOMPUTERS
_xInternet
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xNetworking
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aComputer crimes
_2fast
650 7 _aData protection
_2fast
650 7 _aElectronic commerce
_xSecurity measures
_2fast
650 7 _aInternet
_xSecurity measures
_2fast
700 1 _aJakobsson, Markus.
758 _ihas work:
_aThe death of the internet (Text)
_1https://id.oclc.org/worldcat/entity/E39PCH68HmKDk3FcCTdhfvykrC
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_z9786613770028
_w(DLC) 2011047198
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781118312551
938 _aAskews and Holts Library Services
_bASKH
_nAH21631944
938 _aCoutts Information Services
_bCOUT
_n22977842
938 _aProQuest Ebook Central
_bEBLB
_nEBL848529
938 _aEBSCOhost
_bEBSC
_n467057
938 _aYBP Library Services
_bYANK
_n9571129
938 _aYBP Library Services
_bYANK
_n7657566
938 _aYBP Library Services
_bYANK
_n12671977
994 _a92
_bINLUM
999 _c11799
_d11799