000 06567cam a2200841Ia 4500
005 20250919211744.0
006 m o d
007 cr cnu---unuuu
008 171212s2012 nju ob 000 0 eng d
020 _a9781118312551
_q(electronic bk.)
020 _a1118312554
_q(electronic bk.)
020 _a9781118312537
_q(electronic bk.)
020 _a1118312538
_q(electronic bk.)
020 _z1118062418
020 _z9781118062418
024 8 _a9786613770028
029 1 _aAU@
_b000049858911
029 1 _aDEBSZ
_b397235429
029 1 _aNZ1
_b14695013
029 1 _aNZ1
_b15340854
035 _a(OCoLC)799768467
_z(OCoLC)805071189
_z(OCoLC)858699726
035 _a(OCoLC)ocn799768467
037 _a377002
_bMIL
037 _a34298BC4-4E6D-4D1E-8B17-7DBF7E8D0BA7
_bOverDrive, Inc.
_nhttp://www.overdrive.com
039 9 _a201902121540
_bros
_y12-12-2017
_zhafiz
_wMYUKM (1).mrc
_x434
040 _aEBLCP
_beng
_epn
_cEBLCP
_dDG1
_dYDXCP
_dNST
_dCDX
_dOCLCO
_dCOO
_dOCLCO
_dOCLCQ
_dTEFOD
_dOCLCF
_dDEBSZ
_dOCLCO
_dOCLCQ
_dIEEEE
_dTEFOD
_dOCLCQ
_dDG1
049 _aMAIN
050 4 _aTK5105.875.I57
_b.J34 2012
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_222
245 0 4 _aThe death of the internet /
_cedited by Markus Jakobsson.
260 _aHoboken :
_bJohn Wiley & Sons,
_c©2012.
300 _a1 online resource (387 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
500 _a4.4.3 The Domain.
504 _aIncludes bibliographical references.
505 0 _aTHE DEATH OF THE INTERNET; Contents; Foreword; Preface; Is the Title of this Book a Joke?; Acknowledgments; Contributors; Part I The Problem; 1 What Could Kill the Internet? And so What?; 2 It is About People; 2.1 Human and Social Issues; 2.1.1 Nigerian Scams; 2.1.2 Password Reuse; 2.1.3 Phishing; 2.2 Who are the Criminals?; 2.2.1 Who are they?; 2.2.2 Where are they?; 2.2.3 Deep-Dive: Taking a Look at Ex-Soviet Hackers; 2.2.4 Let's try to Find Parallels in the World we Live in; 2.2.5 Crime and Punishment?; 3 How Criminals Profit; 3.1 Online Advertising Fraud; 3.1.1 Advertising on the Internet.
505 8 _a3.1.1.1 Ad serving architecture3.1.1.2 Targeted advertising; 3.1.1.3 Revenue models; 3.1.2 Exploits of Online Advertising Systems; 3.1.2.1 Adversary; 3.1.2.2 Ad Fraud; 3.1.3 Click Fraud; 3.1.3.1 Case study: advertisers scammed by porn sites; 3.1.3.2 Countermeasures to fight click fraud; 3.1.4 Malvertising: Spreading Malware via Ads; 3.1.4.1 Countermeasures to fight malvertising; 3.1.5 Inflight Modification of Ad Traffic; 3.1.5.1 Countermeasures to fight inflight modification of ad traffic; 3.1.6 Adware: Unsolicited Software Ads; 3.1.6.1 Countermeasures to fight adware; 3.1.7 Conclusion.
505 8 _a3.2 Toeing the Line: Legal but Deceptive Service Offers3.2.1 How Does it Work?; 3.2.2 What do they Earn?; 3.3 Phishing and Some Related Attacks; 3.3.1 The Problem is the User; 3.3.2 Phishing; 3.3.3 Man-in-the-Middle; 3.3.4 Man-in-the-Browser; 3.3.5 New Attack: Man-in-the-Screen; 3.4 Malware: Current Outlook; 3.4.1 Malware Evolution; 3.4.1.1 Malware categories; 3.4.1.2 Malware example; 3.4.1.3 Polymorphic malware; 3.4.2 Malware Supply and Demand; 3.4.2.1 The malware industry; 3.4.2.2 Malware supply chain; 3.5 Monetization; 3.5.1 There is Money Everywhere; 4 How Things Work and Fail.
505 8 _a4.1 Online Advertising: With Secret Security4.1.1 What is a Click?; 4.1.2 How Secret Filters are Evaluated; 4.1.2.1 Third-party click scoring; 4.1.2.2 Ad network check: new filter, old clicks; 4.1.2.3 Ad network check: old filter, new clicks; 4.1.3 What do Fraudsters Know?; 4.2 Web Security Remediation Efforts; 4.2.1 Introduction; 4.2.2 The Multitude of Web Browser Security Mechanisms; 4.2.2.1 Web browser-based built-in security mechanisms; 4.2.2.2 Selectively invocable browser-based security mechanisms; 4.2.2.3 Advanced browser-based web security mechanisms; 4.2.3 Where do we go from Here?
505 8 _a4.3 Content-Sniffing XSS Attacks: XSS with Non-HTML Content4.3.1 Introduction; 4.3.2 Content-Sniffing XSS Attacks; 4.3.2.1 Content-sniffing; 4.3.2.2 A detailed view of content-sniffing XSS attacks; 4.3.2.3 Why do mismatches happen?; 4.3.2.4 Finding content-sniffing XSS attacks; 4.3.2.5 Example 1: Under the hood of the HotCRP attack; 4.3.2.6 Example 2: An attack on wikipedia; 4.3.3 Defenses; 4.3.3.1 Server-side defenses; 4.3.3.2 Secure content-sniffing; 4.3.3.3 Adoption; 4.3.4 Conclusion; 4.4 Our Internet Infrastructure at Risk; 4.4.1 Introduction; 4.4.2 The Political Structure.
520 _aFraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and governments. This book will examine these and related topics, such as smart phone based web security. This book describes the basic threats to the Internet (loss of trust, loss of advertising revenue, l.
588 0 _aPrint version record.
650 0 _aInternet
_xSecurity measures.
650 0 _aElectronic commerce
_xSecurity measures.
650 0 _aData protection.
650 0 _aComputer crimes.
650 4 _aElectrical engineering.
650 4 _aEngineering.
650 4 _aComputer science.
650 7 _aCOMPUTERS
_xInternet
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xNetworking
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aComputer crimes.
_2fast
_0(OCoLC)fst00872063
650 7 _aData protection.
_2fast
_0(OCoLC)fst00887958
650 7 _aElectronic commerce
_xSecurity measures.
_2fast
_0(OCoLC)fst00906919
650 7 _aInternet
_xSecurity measures.
_2fast
_0(OCoLC)fst01751426
655 4 _aElectronic books.
700 1 _aJakobsson, Markus.
773 0 _tWiley e-books
776 0 8 _iPrint version:
_z9786613770028
_w(DLC) 2011047198
856 4 0 _uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=https://onlinelibrary.wiley.com/book/10.1002/9781118312551
_zWiley Online Library
907 _a.b16541765
_b2022-11-07
_c2019-11-12
942 _n0
914 _avtls003629106
998 _ae
_b2017-12-12
_cm
_dz
_feng
_gnju
_y0
_z.b16541765
999 _c689119
_d689119