Friday, January 16, 2009

Crimeware or ACT 2007 For Dummies

Crimeware: Understanding New Attacks and Defenses

Author: Markus Jakobsson

There’s a new breed of online predators--serious criminals intent on stealing big bucks and top secret information--and their weapons of choice are a dangerous array of tools called “crimeware.” With an ever-growing number of companies, organizations, and individuals turning to the Internet to get things done, there’s an urgent need to understand and prevent these online security attacks.

Crimeware: Understanding New Attacks and Defenses helps security professionals, technical managers, students, and researchers understand and prevent specific crimeware threats. This book guides you through the essential security principles, techniques, and countermeasures to keep you one step ahead of the criminals, regardless of evolving technology and tactics.

Security experts Markus Jakobsson and Zulfikar Ramzan share their extensive academic and in-the-trenches industry experience to help you understand how crimeware works, how to identify it, and how to prevent future attacks before your company’s valuable information falls into the wrong hands. In self-contained chapters, Jakobsson and Ramzan provide thorough, easy-to-understand overviews before drilling down into advanced technical details.

This book will help you

  • Understand current and emerging security threats including root kits, bot networks, spyware, adware, click fraud, and phishing
  • Recognize the interaction between various crimeware threats
  • Learn valuable countermeasures to stop crimeware in its tracks, now and in the future
  • Gain insight into future security trends and threats, and create an effective defense plan



Table of Contents:
Preface

Chapter 1: Overview of Crimeware

Chapter 2: A Taxonomy of Coding Errors

Chapter 3: Crimeware and “Peer-to-Peer” Networks

Chapter 4: Crimeware in Small Devices

Chapter 5: Crimeware in Firmware

Chapter 6: Crimeware in the Browser

Chapter 7: Bot Networks

Chapter 8: Rootkits

Chapter 9: Virtual Worlds and Fraud

Chapter 10: Cybercrime Politics

Chapter 11: Online Advertising Fraud

Chapter 12: Crimeware Business Models

Chapter 13: The Educational Aspect of Security

Chapter 14: Surreptitious Code and The Law

Chapter 15: Crimeware and Trusted Computing

Chapter 16: Technical Defense Techniques

Chapter 17: The Future of Crimeware

References

Index

New interesting book: Eves Herbs or Dietary Reference Intakes for Energy Carbohydrate Fiber Fat Fatty Acids Cholesterol Protein and Amino Acids

ACT! 2007 For Dummies

Author: Karen S Fredricks

Find out how to get the most from your ACT!


Manage your contacts, communicate, synchronize ACT! with Outlook, and more

You have a business or organization to run. ACT! is designed to make that easier, and this book helps you get your ACT! together. Here's how to set up ACT! 2007, enter and organize contact information, use ACT! to track activities, prioritize leads, and produce reports, and make it act exactly as you need it to.

Discover how to



• View details on a particular contact

• Generate faxes, e-mail, or snail mail to a list

• Add fields to customize ACT!

• Handle backups and eliminate duplications

• Group and sort contacts




No comments:

Post a Comment