000 | 01651cam a2200325 a 4500 | ||
---|---|---|---|
001 | 15110270 | ||
005 | 20201128020734.0 | ||
008 | 071212s2008 njua b 001 0 eng | ||
010 | _a2007050736 | ||
020 | _a9780321501950 (pbk. : alk. paper) | ||
020 | _a0321501950 (pbk. : alk. paper) | ||
035 | _a(OCoLC)ocn183926572 | ||
035 | _a(OCoLC)183926572 | ||
040 |
_aDLC _cDLC _dBAKER _dYDXCP _dC#P _dDLC |
||
050 | 0 | 0 |
_aQA76.9.A25 _bC75 2008 |
082 | 0 | 0 |
_a005.8 _222 _bJAK |
100 |
_93069 _aJakobsson, Markus |
||
245 | 0 | 0 |
_aCrimeware : _bUnderstanding New Attacks and Defenses / _cMarkus Jakobsson, Zulfikar Ramzan. |
260 |
_aUpper Saddle River, NJ : _bAddison-Wesley, _cc2008. |
||
300 |
_axxi, 582 p. : _bill. ; _c24 cm. |
||
504 | _aIncludes bibliographical references (p. 525-556) and index. | ||
505 | 0 | _aOverview of crimeware -- A taxonomy of coding errors -- Crimeware and peer-to-peer networks -- Crimeware in small devices -- Crimeware in firmware -- Crimeware in the browser -- Bot networks -- Rootkits -- Virtual worlds and fraud -- Cybercrime and politics -- Online advertising fraud -- Crimeware business models -- The educational aspect of security -- Surreptitious code and the law -- Crimeware and trusted computing -- Technical defense techniques -- The future of crimeware. | |
650 | 0 |
_aComputer security. _93070 |
|
650 | 0 |
_aInternet _xSecurity measures. _93071 |
|
650 | 0 |
_93072 _aComputer crimes |
|
700 | 1 |
_aJakobsson, Markus. _93073 |
|
700 | 1 |
_aRamzan, Zulfikar. _93074 |
|
942 |
_2ddc _cBB |
||
999 |
_c11166 _d11166 |