Crimeware: Understanding New Attacks and Defenses
Author: Markus Jakobsson
There’s a new breed of online predators--serious criminals intent on stealing big bucks and top secret information--and their weapons of choice are a dangerous array of tools called “crimeware.” With an ever-growing number of companies, organizations, and individuals turning to the Internet to get things done, there’s an urgent need to understand and prevent these online security attacks.
Crimeware: Understanding New Attacks and Defenses helps security professionals, technical managers, students, and researchers understand and prevent specific crimeware threats. This book guides you through the essential security principles, techniques, and countermeasures to keep you one step ahead of the criminals, regardless of evolving technology and tactics.
Security experts Markus Jakobsson and Zulfikar Ramzan share their extensive academic and in-the-trenches industry experience to help you understand how crimeware works, how to identify it, and how to prevent future attacks before your company’s valuable information falls into the wrong hands. In self-contained chapters, Jakobsson and Ramzan provide thorough, easy-to-understand overviews before drilling down into advanced technical details.
This book will help you
- Understand current and emerging security threats including root kits, bot networks, spyware, adware, click fraud, and phishing
- Recognize the interaction between various crimeware threats
- Learn valuable countermeasures to stop crimeware in its tracks, now and in the future
- Gain insight into future security trends and threats, and create an effective defense plan
Table of Contents:
PrefaceChapter 1: Overview of Crimeware
Chapter 2: A Taxonomy of Coding Errors
Chapter 3: Crimeware and “Peer-to-Peer” Networks
Chapter 4: Crimeware in Small Devices
Chapter 5: Crimeware in Firmware
Chapter 6: Crimeware in the Browser
Chapter 7: Bot Networks
Chapter 8: Rootkits
Chapter 9: Virtual Worlds and Fraud
Chapter 10: Cybercrime Politics
Chapter 11: Online Advertising Fraud
Chapter 12: Crimeware Business Models
Chapter 13: The Educational Aspect of Security
Chapter 14: Surreptitious Code and The Law
Chapter 15: Crimeware and Trusted Computing
Chapter 16: Technical Defense Techniques
Chapter 17: The Future of Crimeware
References
Index
New interesting book: Eves Herbs or Dietary Reference Intakes for Energy Carbohydrate Fiber Fat Fatty Acids Cholesterol Protein and Amino Acids
ACT! 2007 For Dummies
Author: Karen S Fredricks
Find out how to get the most from your ACT!
Manage your contacts, communicate, synchronize ACT! with Outlook, and more
You have a business or organization to run. ACT! is designed to make that easier, and this book helps you get your ACT! together. Here's how to set up ACT! 2007, enter and organize contact information, use ACT! to track activities, prioritize leads, and produce reports, and make it act exactly as you need it to.
Discover how to
• View details on a particular contact
• Generate faxes, e-mail, or snail mail to a list
• Add fields to customize ACT!
• Handle backups and eliminate duplications
• Group and sort contacts
No comments:
Post a Comment