Phishing exposed:
Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress
© 2005
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers. * Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts * Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic * Stay one step ahead of the enemy with all the latest information |
Beschreibung: | 1 online resource (xviii, 395 pages) illustrations |
ISBN: | 1423754301 9781423754305 9781597490306 159749030X 0080489532 9780080489537 9781597499958 1597499951 1281035874 9781281035875 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124431 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2005 |||| o||u| ||||||eng d | ||
020 | |a 1423754301 |9 1-4237-5430-1 | ||
020 | |a 9781423754305 |9 978-1-4237-5430-5 | ||
020 | |a 9781597490306 |9 978-1-59749-030-6 | ||
020 | |a 159749030X |9 1-59749-030-X | ||
020 | |a 0080489532 |9 0-08-048953-2 | ||
020 | |a 9780080489537 |9 978-0-08-048953-7 | ||
020 | |a 9781597499958 |9 978-1-59749-995-8 | ||
020 | |a 1597499951 |9 1-59749-995-1 | ||
020 | |a 1281035874 |9 1-281-03587-4 | ||
020 | |a 9781281035875 |9 978-1-281-03587-5 | ||
035 | |a (ZDB-33-ESD)ocm64185586 | ||
035 | |a (OCoLC)64185586 | ||
035 | |a (DE-599)BVBBV046124431 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 364.168 |2 22 | |
100 | 1 | |a James, Lance |e Verfasser |4 aut | |
245 | 1 | 0 | |a Phishing exposed |c Lance James ; foreward by Joe Stewart |
264 | 1 | |a Rockland, MA |b Syngress |c © 2005 | |
300 | |a 1 online resource (xviii, 395 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers. * Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts * Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic * Stay one step ahead of the enemy with all the latest information | ||
650 | 4 | |a Réseaux d'ordinateurs / Sécurité / Mesures | |
650 | 4 | |a Criminalité informatique | |
650 | 4 | |a Fraude sur Internet | |
650 | 4 | |a Vol d'identité | |
650 | 4 | |a Pourriels | |
650 | 4 | |a Commerce électronique / Pratiques déloyales | |
650 | 4 | |a Hameçonnage | |
650 | 7 | |a TRUE CRIME / White Collar Crime |2 bisacsh | |
650 | 7 | |a Phishing |2 fast | |
650 | 4 | |a Electronic books | |
650 | 4 | |a Phishing | |
650 | 0 | 7 | |a Phishing |0 (DE-588)7515821-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Phishing |0 (DE-588)7515821-8 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597490306 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031504884 | ||
347 | |a data file |2 rda | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9781597490306 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180442431094784 |
---|---|
any_adam_object | |
author | James, Lance |
author_facet | James, Lance |
author_role | aut |
author_sort | James, Lance |
author_variant | l j lj |
building | Verbundindex |
bvnumber | BV046124431 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocm64185586 (OCoLC)64185586 (DE-599)BVBBV046124431 |
dewey-full | 364.168 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.168 |
dewey-search | 364.168 |
dewey-sort | 3364.168 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03688nmm a2200661zc 4500</leader><controlfield tag="001">BV046124431</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423754301</subfield><subfield code="9">1-4237-5430-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423754305</subfield><subfield code="9">978-1-4237-5430-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490306</subfield><subfield code="9">978-1-59749-030-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749030X</subfield><subfield code="9">1-59749-030-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080489532</subfield><subfield code="9">0-08-048953-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489537</subfield><subfield code="9">978-0-08-048953-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499958</subfield><subfield code="9">978-1-59749-995-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499951</subfield><subfield code="9">1-59749-995-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281035874</subfield><subfield code="9">1-281-03587-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281035875</subfield><subfield code="9">978-1-281-03587-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocm64185586</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)64185586</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124431</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.168</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">James, Lance</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Phishing exposed</subfield><subfield code="c">Lance James ; foreward by Joe Stewart</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">© 2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xviii, 395 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers. * Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts * Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic * Stay one step ahead of the enemy with all the latest information</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs / Sécurité / Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraude sur Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Vol d'identité</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pourriels</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Commerce électronique / Pratiques déloyales</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hameçonnage</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TRUE CRIME / White Collar Crime</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Phishing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic books</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Phishing</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Phishing</subfield><subfield code="0">(DE-588)7515821-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Phishing</subfield><subfield code="0">(DE-588)7515821-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597490306</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031504884</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597490306</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124431 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:50Z |
institution | BVB |
isbn | 1423754301 9781423754305 9781597490306 159749030X 0080489532 9780080489537 9781597499958 1597499951 1281035874 9781281035875 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031504884 |
oclc_num | 64185586 |
open_access_boolean | |
physical | 1 online resource (xviii, 395 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress |
record_format | marc |
spelling | James, Lance Verfasser aut Phishing exposed Lance James ; foreward by Joe Stewart Rockland, MA Syngress © 2005 1 online resource (xviii, 395 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers. * Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts * Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic * Stay one step ahead of the enemy with all the latest information Réseaux d'ordinateurs / Sécurité / Mesures Criminalité informatique Fraude sur Internet Vol d'identité Pourriels Commerce électronique / Pratiques déloyales Hameçonnage TRUE CRIME / White Collar Crime bisacsh Phishing fast Electronic books Phishing Phishing (DE-588)7515821-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Phishing (DE-588)7515821-8 s 2\p DE-604 http://www.sciencedirect.com/science/book/9781597490306 Verlag URL des Erstveröffentlichers Volltext data file rda 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | James, Lance Phishing exposed Réseaux d'ordinateurs / Sécurité / Mesures Criminalité informatique Fraude sur Internet Vol d'identité Pourriels Commerce électronique / Pratiques déloyales Hameçonnage TRUE CRIME / White Collar Crime bisacsh Phishing fast Electronic books Phishing Phishing (DE-588)7515821-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)7515821-8 (DE-588)4274324-2 |
title | Phishing exposed |
title_auth | Phishing exposed |
title_exact_search | Phishing exposed |
title_full | Phishing exposed Lance James ; foreward by Joe Stewart |
title_fullStr | Phishing exposed Lance James ; foreward by Joe Stewart |
title_full_unstemmed | Phishing exposed Lance James ; foreward by Joe Stewart |
title_short | Phishing exposed |
title_sort | phishing exposed |
topic | Réseaux d'ordinateurs / Sécurité / Mesures Criminalité informatique Fraude sur Internet Vol d'identité Pourriels Commerce électronique / Pratiques déloyales Hameçonnage TRUE CRIME / White Collar Crime bisacsh Phishing fast Electronic books Phishing Phishing (DE-588)7515821-8 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Réseaux d'ordinateurs / Sécurité / Mesures Criminalité informatique Fraude sur Internet Vol d'identité Pourriels Commerce électronique / Pratiques déloyales Hameçonnage TRUE CRIME / White Collar Crime Phishing Electronic books Computersicherheit |
url | http://www.sciencedirect.com/science/book/9781597490306 |
work_keys_str_mv | AT jameslance phishingexposed |