000 01903cam a2200265 a 4500
008 090505s2008 njua b 001 0 eng
010 _a2007050736
020 _a0321501950
035 _a(Sirsi) u1545
040 _aEG-CaNU
_cEG-CaNU
_dEG-CaNU
042 _ancode
082 0 0 _a005.8
_2 22
245 0 0 _aCrimeware :
_b understanding new attacks and defenses /
_c Markus Jakobsson, Zulfikar Ramzan.
260 _aUpper Saddle River, NJ :
_b Addison-Wesley,
_c c2008.
300 _axxi, 582 p. :
_b ill. ;
_c 24 cm.
504 _aIncludes bibliographical references (p. 525-556) and index.
505 0 _aOverview of crimeware -- A taxonomy of coding errors -- Crimeware and peer-to-peer networks -- Crimeware in small devices -- Crimeware in firmware -- Crimeware in the browser -- Bot networks -- Rootkits -- Virtual worlds and fraud -- Cybercrime and politics -- Online advertising fraud -- Crimeware business models -- The educational aspect of security -- Surreptitious code and the law -- Crimeware and trusted computing -- Technical defense techniques -- The future of crimeware.
520 _aThis book is the most current and comprehensive analysis of the state of Internet security threats right now. The review of current issues and predictions about problems years away are critical for truly understanding crimeware. Every concerned person should have a copy and use it for reference." -Garth Bruen, Project Knuj On Designer There's a new breed of online predators-serious criminals intent on stealing big bucks and top-secret information-and their weapons of choice are a dangerous array of tools called "crimeware." With an ever-growing number of companies
650 0 _aComputer security.
_91926
650 0 _aInternet
_x Security measures.
_91927
650 0 _aComputer crimes.
_91928
700 1 _aJakobsson, Markus.
_91929
700 1 _aRamzan, Zulfikar.
_91930
596 _a1
999 _c601
_d601