Phishing and countermeasures: understanding the increasing problem of electronic identity theft
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ
Wiley
2007
|
Schlagworte: | |
Online-Zugang: | Table of contents only Klappentext |
Beschreibung: | Includes index. |
Beschreibung: | XXVI, 699 S. Ill., graph. Darst. |
ISBN: | 0471782459 9780471782452 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV022230138 | ||
003 | DE-604 | ||
005 | 20070228 | ||
007 | t | ||
008 | 070117s2007 xxuad|| |||| 00||| eng d | ||
010 | |a 2006016019 | ||
020 | |a 0471782459 |c cloth |9 0-471-78245-9 | ||
020 | |a 9780471782452 |9 978-0-471-78245-2 | ||
035 | |a (OCoLC)70129025 | ||
035 | |a (DE-599)BVBBV022230138 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-355 |a DE-11 |a DE-19 | ||
050 | 0 | |a HV6773 | |
082 | 0 | |a 364.16/3 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Phishing and countermeasures |b understanding the increasing problem of electronic identity theft |c ed. by Markus Jakobsson ... |
264 | 1 | |a Hoboken, NJ |b Wiley |c 2007 | |
300 | |a XXVI, 699 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes index. | ||
650 | 4 | |a Phishing | |
650 | 4 | |a Identity theft |x Prevention | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Phishing |0 (DE-588)7515821-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Gegenmaßnahme |0 (DE-588)4445317-6 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Phishing |0 (DE-588)7515821-8 |D s |
689 | 0 | 1 | |a Gegenmaßnahme |0 (DE-588)4445317-6 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |C b |5 DE-604 | |
700 | 1 | |a Jakobsson, Markus |e Sonstige |4 oth | |
856 | 4 | |u http://www.loc.gov/catdir/toc/ecip0615/2006016019.html |3 Table of contents only | |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015441238&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
999 | |a oai:aleph.bib-bvb.de:BVB01-015441238 |
Datensatz im Suchindex
_version_ | 1804136217540820992 |
---|---|
adam_text | Phishing
puter system, continue to mount. Here is the information you need to understand how phish¬
ing works, how to detect it. and how to prevent it.
Phishing and Countermeasures begins with a technical introduction to the problem, setting
forth the tools and techniques that phishers use, along with current security technology and
countermeasures that are used to thwart them. Readers are not only introduced to current
techniques of phishing, but also to emerging and future threats and the countermeasures that
will be needed to stop them. The potential and limitations of all countermeasures presented
in the text are explored in detail. In spite of the fact that phishing attacks constantly evolve,
much of the material in this book will remain valid, given that the book covers the general
principles as much as actual instances of phishing.
While delving into a myriad of countermeasures and defense strategies, the authors also focus
on the role of the user in preventing phishing attacks. The authors assert that countermeasures
often fail not for technical reasons, but rather because users are unable or unwilling to use
them. In response, the authors present a number of countermeasures that are simple for users to
implement, or that can be activated without a user s direct participation. Moreover, the authors
propose strategies for educating users. The text concludes with a discussion of how researchers
and security professionals can ethically and legally perform phishing experiments to test the
effectiveness of their defense strategies against the strength of current and future attacks.
Each chapter of the book features an extensive bibliography to help readers explore individual
topics in greater depth. With phishing becoming an ever-growing threat, the strategies pre¬
sented in this text are vital for technical managers, engineers, and security professionals tasked
with protecting users from unwittingly giving out sensitive data. It is also recommended as a
textbook for students in computer science and informatics.
MARKUS JAKOBSSON. PhD.
Indiana University, where he is also Associate Director of the Center for Applied Cybersecurity
Research. Dr.
subject of phishing and is regularly invited to speak on the topic at conferences and workshops.
University and a member of the University s Center for Applied Cybersecurity Research. Dr.
Myers worked.-on secure email anti-phishing technology at Echoworx Corporation, and has
.written-
|
adam_txt |
Phishing
puter system, continue to mount. Here is the information you need to understand how phish¬
ing works, how to detect it. and how to prevent it.
Phishing and Countermeasures begins with a technical introduction to the problem, setting
forth the tools and techniques that phishers use, along with current security technology and
countermeasures that are used to thwart them. Readers are not only introduced to current
techniques of phishing, but also to emerging and future threats and the countermeasures that
will be needed to stop them. The potential and limitations of all countermeasures presented
in the text are explored in detail. In spite of the fact that phishing attacks constantly evolve,
much of the material in this book will remain valid, given that the book covers the general
principles as much as actual instances of phishing.
While delving into a myriad of countermeasures and defense strategies, the authors also focus
on the role of the user in preventing phishing attacks. The authors assert that countermeasures
often fail not for technical reasons, but rather because users are unable or unwilling to use
them. In response, the authors present a number of countermeasures that are simple for users to
implement, or that can be activated without a user's direct participation. Moreover, the authors
propose strategies for educating users. The text concludes with a discussion of how researchers
and security professionals can ethically and legally perform phishing experiments to test the
effectiveness of their defense strategies against the strength of current and future attacks.
Each chapter of the book features an extensive bibliography to help readers explore individual
topics in greater depth. With phishing becoming an ever-growing threat, the strategies pre¬
sented in this text are vital for technical managers, engineers, and security professionals tasked
with protecting users from unwittingly giving out sensitive data. It is also recommended as a
textbook for students in computer science and informatics.
MARKUS JAKOBSSON. PhD.
Indiana University, where he is also Associate Director of the Center for Applied Cybersecurity
Research. Dr.
subject of phishing and is regularly invited to speak on the topic at conferences and workshops.
University and a member of the University's Center for Applied Cybersecurity Research. Dr.
Myers worked.-on secure email anti-phishing technology at Echoworx Corporation, and has
.written- |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
building | Verbundindex |
bvnumber | BV022230138 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773 |
callnumber-search | HV6773 |
callnumber-sort | HV 46773 |
callnumber-subject | HV - Social Pathology, Criminology |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)70129025 (DE-599)BVBBV022230138 |
dewey-full | 364.16/3 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.16/3 |
dewey-search | 364.16/3 |
dewey-sort | 3364.16 13 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft Informatik |
discipline_str_mv | Rechtswissenschaft Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01848nam a2200481zc 4500</leader><controlfield tag="001">BV022230138</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20070228 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">070117s2007 xxuad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2006016019</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0471782459</subfield><subfield code="c">cloth</subfield><subfield code="9">0-471-78245-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780471782452</subfield><subfield code="9">978-0-471-78245-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)70129025</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022230138</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-19</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.16/3</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Phishing and countermeasures</subfield><subfield code="b">understanding the increasing problem of electronic identity theft</subfield><subfield code="c">ed. by Markus Jakobsson ...</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">Wiley</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXVI, 699 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Phishing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Identity theft</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Phishing</subfield><subfield code="0">(DE-588)7515821-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Gegenmaßnahme</subfield><subfield code="0">(DE-588)4445317-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Phishing</subfield><subfield code="0">(DE-588)7515821-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Gegenmaßnahme</subfield><subfield code="0">(DE-588)4445317-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="C">b</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jakobsson, Markus</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/ecip0615/2006016019.html</subfield><subfield code="3">Table of contents only</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015441238&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015441238</subfield></datafield></record></collection> |
id | DE-604.BV022230138 |
illustrated | Illustrated |
index_date | 2024-07-02T16:32:17Z |
indexdate | 2024-07-09T20:52:53Z |
institution | BVB |
isbn | 0471782459 9780471782452 |
language | English |
lccn | 2006016019 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015441238 |
oclc_num | 70129025 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-11 DE-19 DE-BY-UBM |
owner_facet | DE-355 DE-BY-UBR DE-11 DE-19 DE-BY-UBM |
physical | XXVI, 699 S. Ill., graph. Darst. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Wiley |
record_format | marc |
spelling | Phishing and countermeasures understanding the increasing problem of electronic identity theft ed. by Markus Jakobsson ... Hoboken, NJ Wiley 2007 XXVI, 699 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Includes index. Phishing Identity theft Prevention Computer security Computersicherheit (DE-588)4274324-2 gnd rswk-swf Phishing (DE-588)7515821-8 gnd rswk-swf Gegenmaßnahme (DE-588)4445317-6 gnd rswk-swf Phishing (DE-588)7515821-8 s Gegenmaßnahme (DE-588)4445317-6 s Computersicherheit (DE-588)4274324-2 s b DE-604 Jakobsson, Markus Sonstige oth http://www.loc.gov/catdir/toc/ecip0615/2006016019.html Table of contents only Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015441238&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Klappentext |
spellingShingle | Phishing and countermeasures understanding the increasing problem of electronic identity theft Phishing Identity theft Prevention Computer security Computersicherheit (DE-588)4274324-2 gnd Phishing (DE-588)7515821-8 gnd Gegenmaßnahme (DE-588)4445317-6 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)7515821-8 (DE-588)4445317-6 |
title | Phishing and countermeasures understanding the increasing problem of electronic identity theft |
title_auth | Phishing and countermeasures understanding the increasing problem of electronic identity theft |
title_exact_search | Phishing and countermeasures understanding the increasing problem of electronic identity theft |
title_exact_search_txtP | Phishing and countermeasures understanding the increasing problem of electronic identity theft |
title_full | Phishing and countermeasures understanding the increasing problem of electronic identity theft ed. by Markus Jakobsson ... |
title_fullStr | Phishing and countermeasures understanding the increasing problem of electronic identity theft ed. by Markus Jakobsson ... |
title_full_unstemmed | Phishing and countermeasures understanding the increasing problem of electronic identity theft ed. by Markus Jakobsson ... |
title_short | Phishing and countermeasures |
title_sort | phishing and countermeasures understanding the increasing problem of electronic identity theft |
title_sub | understanding the increasing problem of electronic identity theft |
topic | Phishing Identity theft Prevention Computer security Computersicherheit (DE-588)4274324-2 gnd Phishing (DE-588)7515821-8 gnd Gegenmaßnahme (DE-588)4445317-6 gnd |
topic_facet | Phishing Identity theft Prevention Computer security Computersicherheit Gegenmaßnahme |
url | http://www.loc.gov/catdir/toc/ecip0615/2006016019.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015441238&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT jakobssonmarkus phishingandcountermeasuresunderstandingtheincreasingproblemofelectronicidentitytheft |