| 000 | 06567cam a2200841Ia 4500 | ||
|---|---|---|---|
| 005 | 20250919211744.0 | ||
| 006 | m o d | ||
| 007 | cr cnu---unuuu | ||
| 008 | 171212s2012 nju ob 000 0 eng d | ||
| 020 |
_a9781118312551 _q(electronic bk.) |
||
| 020 |
_a1118312554 _q(electronic bk.) |
||
| 020 |
_a9781118312537 _q(electronic bk.) |
||
| 020 |
_a1118312538 _q(electronic bk.) |
||
| 020 | _z1118062418 | ||
| 020 | _z9781118062418 | ||
| 024 | 8 | _a9786613770028 | |
| 029 | 1 |
_aAU@ _b000049858911 |
|
| 029 | 1 |
_aDEBSZ _b397235429 |
|
| 029 | 1 |
_aNZ1 _b14695013 |
|
| 029 | 1 |
_aNZ1 _b15340854 |
|
| 035 |
_a(OCoLC)799768467 _z(OCoLC)805071189 _z(OCoLC)858699726 |
||
| 035 | _a(OCoLC)ocn799768467 | ||
| 037 |
_a377002 _bMIL |
||
| 037 |
_a34298BC4-4E6D-4D1E-8B17-7DBF7E8D0BA7 _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
| 039 | 9 |
_a201902121540 _bros _y12-12-2017 _zhafiz _wMYUKM (1).mrc _x434 |
|
| 040 |
_aEBLCP _beng _epn _cEBLCP _dDG1 _dYDXCP _dNST _dCDX _dOCLCO _dCOO _dOCLCO _dOCLCQ _dTEFOD _dOCLCF _dDEBSZ _dOCLCO _dOCLCQ _dIEEEE _dTEFOD _dOCLCQ _dDG1 |
||
| 049 | _aMAIN | ||
| 050 | 4 |
_aTK5105.875.I57 _b.J34 2012 |
|
| 072 | 7 |
_aCOM _x060040 _2bisacsh |
|
| 072 | 7 |
_aCOM _x043050 _2bisacsh |
|
| 072 | 7 |
_aCOM _x053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a005.8 _222 |
| 245 | 0 | 4 |
_aThe death of the internet / _cedited by Markus Jakobsson. |
| 260 |
_aHoboken : _bJohn Wiley & Sons, _c©2012. |
||
| 300 | _a1 online resource (387 pages) | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 500 | _a4.4.3 The Domain. | ||
| 504 | _aIncludes bibliographical references. | ||
| 505 | 0 | _aTHE DEATH OF THE INTERNET; Contents; Foreword; Preface; Is the Title of this Book a Joke?; Acknowledgments; Contributors; Part I The Problem; 1 What Could Kill the Internet? And so What?; 2 It is About People; 2.1 Human and Social Issues; 2.1.1 Nigerian Scams; 2.1.2 Password Reuse; 2.1.3 Phishing; 2.2 Who are the Criminals?; 2.2.1 Who are they?; 2.2.2 Where are they?; 2.2.3 Deep-Dive: Taking a Look at Ex-Soviet Hackers; 2.2.4 Let's try to Find Parallels in the World we Live in; 2.2.5 Crime and Punishment?; 3 How Criminals Profit; 3.1 Online Advertising Fraud; 3.1.1 Advertising on the Internet. | |
| 505 | 8 | _a3.1.1.1 Ad serving architecture3.1.1.2 Targeted advertising; 3.1.1.3 Revenue models; 3.1.2 Exploits of Online Advertising Systems; 3.1.2.1 Adversary; 3.1.2.2 Ad Fraud; 3.1.3 Click Fraud; 3.1.3.1 Case study: advertisers scammed by porn sites; 3.1.3.2 Countermeasures to fight click fraud; 3.1.4 Malvertising: Spreading Malware via Ads; 3.1.4.1 Countermeasures to fight malvertising; 3.1.5 Inflight Modification of Ad Traffic; 3.1.5.1 Countermeasures to fight inflight modification of ad traffic; 3.1.6 Adware: Unsolicited Software Ads; 3.1.6.1 Countermeasures to fight adware; 3.1.7 Conclusion. | |
| 505 | 8 | _a3.2 Toeing the Line: Legal but Deceptive Service Offers3.2.1 How Does it Work?; 3.2.2 What do they Earn?; 3.3 Phishing and Some Related Attacks; 3.3.1 The Problem is the User; 3.3.2 Phishing; 3.3.3 Man-in-the-Middle; 3.3.4 Man-in-the-Browser; 3.3.5 New Attack: Man-in-the-Screen; 3.4 Malware: Current Outlook; 3.4.1 Malware Evolution; 3.4.1.1 Malware categories; 3.4.1.2 Malware example; 3.4.1.3 Polymorphic malware; 3.4.2 Malware Supply and Demand; 3.4.2.1 The malware industry; 3.4.2.2 Malware supply chain; 3.5 Monetization; 3.5.1 There is Money Everywhere; 4 How Things Work and Fail. | |
| 505 | 8 | _a4.1 Online Advertising: With Secret Security4.1.1 What is a Click?; 4.1.2 How Secret Filters are Evaluated; 4.1.2.1 Third-party click scoring; 4.1.2.2 Ad network check: new filter, old clicks; 4.1.2.3 Ad network check: old filter, new clicks; 4.1.3 What do Fraudsters Know?; 4.2 Web Security Remediation Efforts; 4.2.1 Introduction; 4.2.2 The Multitude of Web Browser Security Mechanisms; 4.2.2.1 Web browser-based built-in security mechanisms; 4.2.2.2 Selectively invocable browser-based security mechanisms; 4.2.2.3 Advanced browser-based web security mechanisms; 4.2.3 Where do we go from Here? | |
| 505 | 8 | _a4.3 Content-Sniffing XSS Attacks: XSS with Non-HTML Content4.3.1 Introduction; 4.3.2 Content-Sniffing XSS Attacks; 4.3.2.1 Content-sniffing; 4.3.2.2 A detailed view of content-sniffing XSS attacks; 4.3.2.3 Why do mismatches happen?; 4.3.2.4 Finding content-sniffing XSS attacks; 4.3.2.5 Example 1: Under the hood of the HotCRP attack; 4.3.2.6 Example 2: An attack on wikipedia; 4.3.3 Defenses; 4.3.3.1 Server-side defenses; 4.3.3.2 Secure content-sniffing; 4.3.3.3 Adoption; 4.3.4 Conclusion; 4.4 Our Internet Infrastructure at Risk; 4.4.1 Introduction; 4.4.2 The Political Structure. | |
| 520 | _aFraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and governments. This book will examine these and related topics, such as smart phone based web security. This book describes the basic threats to the Internet (loss of trust, loss of advertising revenue, l. | ||
| 588 | 0 | _aPrint version record. | |
| 650 | 0 |
_aInternet _xSecurity measures. |
|
| 650 | 0 |
_aElectronic commerce _xSecurity measures. |
|
| 650 | 0 | _aData protection. | |
| 650 | 0 | _aComputer crimes. | |
| 650 | 4 | _aElectrical engineering. | |
| 650 | 4 | _aEngineering. | |
| 650 | 4 | _aComputer science. | |
| 650 | 7 |
_aCOMPUTERS _xInternet _xSecurity. _2bisacsh |
|
| 650 | 7 |
_aCOMPUTERS _xNetworking _xSecurity. _2bisacsh |
|
| 650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh |
|
| 650 | 7 |
_aComputer crimes. _2fast _0(OCoLC)fst00872063 |
|
| 650 | 7 |
_aData protection. _2fast _0(OCoLC)fst00887958 |
|
| 650 | 7 |
_aElectronic commerce _xSecurity measures. _2fast _0(OCoLC)fst00906919 |
|
| 650 | 7 |
_aInternet _xSecurity measures. _2fast _0(OCoLC)fst01751426 |
|
| 655 | 4 | _aElectronic books. | |
| 700 | 1 | _aJakobsson, Markus. | |
| 773 | 0 | _tWiley e-books | |
| 776 | 0 | 8 |
_iPrint version: _z9786613770028 _w(DLC) 2011047198 |
| 856 | 4 | 0 |
_uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=https://onlinelibrary.wiley.com/book/10.1002/9781118312551 _zWiley Online Library |
| 907 |
_a.b16541765 _b2022-11-07 _c2019-11-12 |
||
| 942 | _n0 | ||
| 914 | _avtls003629106 | ||
| 998 |
_ae _b2017-12-12 _cm _dz _feng _gnju _y0 _z.b16541765 |
||
| 999 |
_c689119 _d689119 |
||