Phishing exposed:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress
c2005
|
Schlagworte: | |
Online-Zugang: | FAW01 Volltext |
Beschreibung: | Includes index Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers. * Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts * Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic * Stay one step ahead of the enemy with all the latest information |
Beschreibung: | 1 Online-Ressource (xviii, 395 p.) |
ISBN: | 0080489532 1423754301 159749030X 1597499951 9780080489537 9781423754305 9781597490306 9781597499958 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042307395 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2005 |||| o||u| ||||||eng d | ||
020 | |a 0080489532 |9 0-08-048953-2 | ||
020 | |a 1423754301 |c electronic bk. |9 1-4237-5430-1 | ||
020 | |a 159749030X |9 1-59749-030-X | ||
020 | |a 1597499951 |c electronic bk. |9 1-59749-995-1 | ||
020 | |a 9780080489537 |9 978-0-08-048953-7 | ||
020 | |a 9781423754305 |c electronic bk. |9 978-1-4237-5430-5 | ||
020 | |a 9781597490306 |9 978-1-59749-030-6 | ||
020 | |a 9781597499958 |c electronic bk. |9 978-1-59749-995-8 | ||
035 | |a (OCoLC)64185586 | ||
035 | |a (DE-599)BVBBV042307395 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 364.168 |2 22 | |
100 | 1 | |a James, Lance |e Verfasser |4 aut | |
245 | 1 | 0 | |a Phishing exposed |c Lance James ; foreward by Joe Stewart |
264 | 1 | |a Rockland, MA |b Syngress |c c2005 | |
300 | |a 1 Online-Ressource (xviii, 395 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers. * Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts * Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic * Stay one step ahead of the enemy with all the latest information | ||
650 | 7 | |a TRUE CRIME / White Collar Crime |2 bisacsh | |
650 | 4 | |a Réseaux d'ordinateurs / Sécurité / Mesures | |
650 | 4 | |a Criminalité informatique | |
650 | 4 | |a Fraude sur Internet | |
650 | 4 | |a Vol d'identité | |
650 | 4 | |a Pourriels | |
650 | 4 | |a Commerce électronique / Pratiques déloyales | |
650 | 4 | |a Hameçonnage | |
650 | 7 | |a Phishing |2 local | |
650 | 7 | |a Electronic mail systems / Security measures |2 local | |
650 | 4 | |a Phishing | |
650 | 0 | 7 | |a Phishing |0 (DE-588)7515821-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | |a Electronic books | ||
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Phishing |0 (DE-588)7515821-8 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597490306 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD | ||
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027744387 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9781597490306 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152892630761472 |
---|---|
any_adam_object | |
author | James, Lance |
author_facet | James, Lance |
author_role | aut |
author_sort | James, Lance |
author_variant | l j lj |
building | Verbundindex |
bvnumber | BV042307395 |
collection | ZDB-33-ESD |
ctrlnum | (OCoLC)64185586 (DE-599)BVBBV042307395 |
dewey-full | 364.168 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.168 |
dewey-search | 364.168 |
dewey-sort | 3364.168 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03692nmm a2200661zc 4500</leader><controlfield tag="001">BV042307395</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080489532</subfield><subfield code="9">0-08-048953-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423754301</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4237-5430-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749030X</subfield><subfield code="9">1-59749-030-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499951</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-995-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489537</subfield><subfield code="9">978-0-08-048953-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423754305</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4237-5430-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490306</subfield><subfield code="9">978-1-59749-030-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499958</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-995-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)64185586</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042307395</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.168</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">James, Lance</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Phishing exposed</subfield><subfield code="c">Lance James ; foreward by Joe Stewart</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">c2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xviii, 395 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers. * Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts * Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic * Stay one step ahead of the enemy with all the latest information</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TRUE CRIME / White Collar Crime</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs / Sécurité / Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraude sur Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vol d'identité</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pourriels</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Commerce électronique / Pratiques déloyales</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hameçonnage</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Phishing</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic mail systems / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Phishing</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Phishing</subfield><subfield code="0">(DE-588)7515821-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Phishing</subfield><subfield code="0">(DE-588)7515821-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597490306</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027744387</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597490306</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042307395 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:56Z |
institution | BVB |
isbn | 0080489532 1423754301 159749030X 1597499951 9780080489537 9781423754305 9781597490306 9781597499958 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027744387 |
oclc_num | 64185586 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xviii, 395 p.) |
psigel | ZDB-33-ESD FLA_PDA_ESD ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress |
record_format | marc |
spelling | James, Lance Verfasser aut Phishing exposed Lance James ; foreward by Joe Stewart Rockland, MA Syngress c2005 1 Online-Ressource (xviii, 395 p.) txt rdacontent c rdamedia cr rdacarrier Includes index Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers. * Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts * Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic * Stay one step ahead of the enemy with all the latest information TRUE CRIME / White Collar Crime bisacsh Réseaux d'ordinateurs / Sécurité / Mesures Criminalité informatique Fraude sur Internet Vol d'identité Pourriels Commerce électronique / Pratiques déloyales Hameçonnage Phishing local Electronic mail systems / Security measures local Phishing Phishing (DE-588)7515821-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Electronic books Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Phishing (DE-588)7515821-8 s 2\p DE-604 http://www.sciencedirect.com/science/book/9781597490306 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | James, Lance Phishing exposed TRUE CRIME / White Collar Crime bisacsh Réseaux d'ordinateurs / Sécurité / Mesures Criminalité informatique Fraude sur Internet Vol d'identité Pourriels Commerce électronique / Pratiques déloyales Hameçonnage Phishing local Electronic mail systems / Security measures local Phishing Phishing (DE-588)7515821-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)7515821-8 (DE-588)4274324-2 |
title | Phishing exposed |
title_auth | Phishing exposed |
title_exact_search | Phishing exposed |
title_full | Phishing exposed Lance James ; foreward by Joe Stewart |
title_fullStr | Phishing exposed Lance James ; foreward by Joe Stewart |
title_full_unstemmed | Phishing exposed Lance James ; foreward by Joe Stewart |
title_short | Phishing exposed |
title_sort | phishing exposed |
topic | TRUE CRIME / White Collar Crime bisacsh Réseaux d'ordinateurs / Sécurité / Mesures Criminalité informatique Fraude sur Internet Vol d'identité Pourriels Commerce électronique / Pratiques déloyales Hameçonnage Phishing local Electronic mail systems / Security measures local Phishing Phishing (DE-588)7515821-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | TRUE CRIME / White Collar Crime Réseaux d'ordinateurs / Sécurité / Mesures Criminalité informatique Fraude sur Internet Vol d'identité Pourriels Commerce électronique / Pratiques déloyales Hameçonnage Phishing Electronic mail systems / Security measures Computersicherheit |
url | http://www.sciencedirect.com/science/book/9781597490306 |
work_keys_str_mv | AT jameslance phishingexposed |