My Account Log in

1 option

Cyber fraud : tactics, techniques, and procedures / editor-in-chief, James Graham ; executive editors, Rick Howard, Ralph Thomas, Steven Winterfeld ; authors and editors, Kellie Bryan. [and others].

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Contributor:
Graham, James.
Howard, Rick.
Language:
English
Subjects (All):
Computer crimes.
Computer crimes--Prevention.
Computer security.
Physical Description:
1 online resource (522 p.)
Edition:
1st edition
Place of Publication:
Boca Raton : CRC Press, 2009.
Language Note:
English
System Details:
text file
Summary:
With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. Combining the best of investigative journalism and technical analysis, Cyber Fraud: Tactics, Techniques, and Procedures documents changes in the culture of cyber criminals and explores the innovations that are the result of those changes. The book uses the term Botnet as a metaphor for the evolving changes represented by this underground economy.Copiously illustrated, this engaging and engrossing book explores the state of threat
Contents:
Front cover; Contents; Introduction; PART I: UNDERGROUND CULTURE; Chapter 1. Emerging Economic Models for Software Vulnerability Research; Chapter 2. Cyber Fraud: Principles, Trends, and Mitigation Techniques; Chapter 3. The Cyber Threat Landscape in Russia; Chapter 4. The Cyber Threat Landscape in Brazil; Chapter 5. The Russian Business Network: The Rise and Fall of a Criminal ISP; Chapter 6. Banking Trojans: An Overview; Chapter 7. Inside the World of Money Mules; PART II: UNDERGROUND INNOVATION; Chapter 8. IFrame Attacks - An Examination of the Business of IFrame Exploitation
Chapter 9. Distributed Denial of Service (DDoS) Attacks: Motivations and MethodsChapter 10. The Torpig Trojan Exposed; Chapter 11. The Lagma Trojan*; Chapter 12. Better Business Bureau (BBB): A Threat Analysis of Targeted Spear-Phishing Attacks; Chapter 13. SilentBanker Unmuted: An In-Depth Examination of the SilentBanker Trojan Horse; Chapter 14. Preventing Malicious Code from ""Phoning Home""; Chapter 15. Mobile Malicious Code Trends; Epilogue; Index; Back cover
Notes:
Description based upon print version of record.
Includes bibliographical references and index.
Description based on print version record.
ISBN:
9781040078617
1040078613
9780429186004
0429186002
9781420091281
142009128X
OCLC:
899155459

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account