27,30 €
27,30 €
inkl. MwSt.
Sofort per Download lieferbar
payback
0 °P sammeln
27,30 €
27,30 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
0 °P sammeln
Als Download kaufen
27,30 €
inkl. MwSt.
Sofort per Download lieferbar
payback
0 °P sammeln
Jetzt verschenken
27,30 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
0 °P sammeln
  • Format: PDF

"Phishing" is the hot new identity theft scam. An unsuspectingvictim receives an e-mail that seems to come from a bank or otherfinancial institution, and it contains a link to a Web site wheres/he is asked to provide account details. The site lookslegitimate, and 3 to 5 percent of people who receive the e-mail goon to surrender their information-to crooks. One e-mail monitoringorganization reported 2.3 billion phishing messages in February2004 alone.If that weren't enough, the crooks have expanded theiroperations to include malicious code that steals identityinformation without the computer…mehr

Produktbeschreibung
"Phishing" is the hot new identity theft scam. An unsuspectingvictim receives an e-mail that seems to come from a bank or otherfinancial institution, and it contains a link to a Web site wheres/he is asked to provide account details. The site lookslegitimate, and 3 to 5 percent of people who receive the e-mail goon to surrender their information-to crooks. One e-mail monitoringorganization reported 2.3 billion phishing messages in February2004 alone.If that weren't enough, the crooks have expanded theiroperations to include malicious code that steals identityinformation without the computer user's knowledge. Thousands ofcomputers are compromised each day, and phishing code isincreasingly becoming part of the standard exploits.Written by a phishing security expert at a top financialinstitution, this unique book helps IT professionals respond tophishing incidents. After describing in detail what goes intophishing expeditions, the author provides step-by-step directionsfor discouraging attacks and responding to those that have alreadyhappened.In Phishing, Rachael Lininger:* Offers case studies that reveal the technical ins and outs ofimpressive phishing attacks.* Presents a step-by-step model for phishing prevention.* Explains how intrusion detection systems can help preventphishers from attaining their goal-identity theft.* Delivers in-depth incident response techniques that can quicklyshutdown phishing sites.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Rachael Lininger works as a technical writer in theinformation security department of a major U.S. financialinstitution. She has documented too many phishing cases to count.Russell Dean Vines is a best-selling author and presidentof The RDV Group, a security services firm. He is a specialist incyber counter-terrorism and a consultant on securityvulnerabilities.