Phishing exposed:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress
©2005
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes index Banking on phishing -- Go Phish!-- E-mail: the weapon of mass delivery -- Crossing the phishing line -- The dark side of the web -- Malware, money savers, and ma bell mayhem! -- So long, and thanks for all the phish! Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers. * Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts * Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic * Stay one step ahead of the enemy with all the latest information |
Beschreibung: | 1 Online-Ressource (xviii, 395 pages) |
ISBN: | 0080489532 1423754301 159749030X 1597499951 9780080489537 9781423754305 9781597490306 9781597499958 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043162509 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2005 |||| o||u| ||||||eng d | ||
020 | |a 0080489532 |9 0-08-048953-2 | ||
020 | |a 1423754301 |9 1-4237-5430-1 | ||
020 | |a 159749030X |9 1-59749-030-X | ||
020 | |a 1597499951 |9 1-59749-995-1 | ||
020 | |a 9780080489537 |9 978-0-08-048953-7 | ||
020 | |a 9781423754305 |9 978-1-4237-5430-5 | ||
020 | |a 9781597490306 |9 978-1-59749-030-6 | ||
020 | |a 9781597499958 |9 978-1-59749-995-8 | ||
035 | |a (OCoLC)64185586 | ||
035 | |a (DE-599)BVBBV043162509 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 364.168 |2 22 | |
100 | 1 | |a James, Lance |e Verfasser |4 aut | |
245 | 1 | 0 | |a Phishing exposed |c Lance James ; foreward by Joe Stewart |
264 | 1 | |a Rockland, MA |b Syngress |c ©2005 | |
300 | |a 1 Online-Ressource (xviii, 395 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Banking on phishing -- Go Phish!-- E-mail: the weapon of mass delivery -- Crossing the phishing line -- The dark side of the web -- Malware, money savers, and ma bell mayhem! -- So long, and thanks for all the phish! | ||
500 | |a Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers. * Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts * Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic * Stay one step ahead of the enemy with all the latest information | ||
650 | 4 | |a Phishing | |
650 | 4 | |a Electronic mail systems / Security measures | |
650 | 4 | |a Réseaux d'ordinateurs / Sécurité / Mesures | |
650 | 4 | |a Criminalité informatique | |
650 | 4 | |a Fraude sur Internet | |
650 | 4 | |a Vol d'identité | |
650 | 4 | |a Pourriels | |
650 | 4 | |a Commerce électronique / Pratiques déloyales | |
650 | 4 | |a Hameçonnage | |
650 | 7 | |a TRUE CRIME / White Collar Crime |2 bisacsh | |
650 | 4 | |a Phishing | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Phishing |0 (DE-588)7515821-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Phishing |0 (DE-588)7515821-8 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149585 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028586700 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149585 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149585 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175634206818304 |
---|---|
any_adam_object | |
author | James, Lance |
author_facet | James, Lance |
author_role | aut |
author_sort | James, Lance |
author_variant | l j lj |
building | Verbundindex |
bvnumber | BV043162509 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)64185586 (DE-599)BVBBV043162509 |
dewey-full | 364.168 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.168 |
dewey-search | 364.168 |
dewey-sort | 3364.168 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04032nmm a2200661zc 4500</leader><controlfield tag="001">BV043162509</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080489532</subfield><subfield code="9">0-08-048953-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423754301</subfield><subfield code="9">1-4237-5430-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749030X</subfield><subfield code="9">1-59749-030-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499951</subfield><subfield code="9">1-59749-995-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489537</subfield><subfield code="9">978-0-08-048953-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423754305</subfield><subfield code="9">978-1-4237-5430-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490306</subfield><subfield code="9">978-1-59749-030-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499958</subfield><subfield code="9">978-1-59749-995-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)64185586</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043162509</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.168</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">James, Lance</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Phishing exposed</subfield><subfield code="c">Lance James ; foreward by Joe Stewart</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">©2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xviii, 395 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Banking on phishing -- Go Phish!-- E-mail: the weapon of mass delivery -- Crossing the phishing line -- The dark side of the web -- Malware, money savers, and ma bell mayhem! -- So long, and thanks for all the phish!</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers. * Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts * Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic * Stay one step ahead of the enemy with all the latest information</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Phishing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic mail systems / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs / Sécurité / Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraude sur Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vol d'identité</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pourriels</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Commerce électronique / Pratiques déloyales</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hameçonnage</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TRUE CRIME / White Collar Crime</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Phishing</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Phishing</subfield><subfield code="0">(DE-588)7515821-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Phishing</subfield><subfield code="0">(DE-588)7515821-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149585</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028586700</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149585</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149585</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043162509 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:19:24Z |
institution | BVB |
isbn | 0080489532 1423754301 159749030X 1597499951 9780080489537 9781423754305 9781597490306 9781597499958 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028586700 |
oclc_num | 64185586 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xviii, 395 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress |
record_format | marc |
spelling | James, Lance Verfasser aut Phishing exposed Lance James ; foreward by Joe Stewart Rockland, MA Syngress ©2005 1 Online-Ressource (xviii, 395 pages) txt rdacontent c rdamedia cr rdacarrier Includes index Banking on phishing -- Go Phish!-- E-mail: the weapon of mass delivery -- Crossing the phishing line -- The dark side of the web -- Malware, money savers, and ma bell mayhem! -- So long, and thanks for all the phish! Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers. * Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts * Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic * Stay one step ahead of the enemy with all the latest information Phishing Electronic mail systems / Security measures Réseaux d'ordinateurs / Sécurité / Mesures Criminalité informatique Fraude sur Internet Vol d'identité Pourriels Commerce électronique / Pratiques déloyales Hameçonnage TRUE CRIME / White Collar Crime bisacsh Computersicherheit (DE-588)4274324-2 gnd rswk-swf Phishing (DE-588)7515821-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Phishing (DE-588)7515821-8 s 2\p DE-604 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149585 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | James, Lance Phishing exposed Phishing Electronic mail systems / Security measures Réseaux d'ordinateurs / Sécurité / Mesures Criminalité informatique Fraude sur Internet Vol d'identité Pourriels Commerce électronique / Pratiques déloyales Hameçonnage TRUE CRIME / White Collar Crime bisacsh Computersicherheit (DE-588)4274324-2 gnd Phishing (DE-588)7515821-8 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)7515821-8 |
title | Phishing exposed |
title_auth | Phishing exposed |
title_exact_search | Phishing exposed |
title_full | Phishing exposed Lance James ; foreward by Joe Stewart |
title_fullStr | Phishing exposed Lance James ; foreward by Joe Stewart |
title_full_unstemmed | Phishing exposed Lance James ; foreward by Joe Stewart |
title_short | Phishing exposed |
title_sort | phishing exposed |
topic | Phishing Electronic mail systems / Security measures Réseaux d'ordinateurs / Sécurité / Mesures Criminalité informatique Fraude sur Internet Vol d'identité Pourriels Commerce électronique / Pratiques déloyales Hameçonnage TRUE CRIME / White Collar Crime bisacsh Computersicherheit (DE-588)4274324-2 gnd Phishing (DE-588)7515821-8 gnd |
topic_facet | Phishing Electronic mail systems / Security measures Réseaux d'ordinateurs / Sécurité / Mesures Criminalité informatique Fraude sur Internet Vol d'identité Pourriels Commerce électronique / Pratiques déloyales Hameçonnage TRUE CRIME / White Collar Crime Computersicherheit |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149585 |
work_keys_str_mv | AT jameslance phishingexposed |