Malicious Bots

Malicious Bots

Einband:
Fester Einband
EAN:
9781420069037
Untertitel:
An Inside Look into the Cyber-Criminal Underground of the Internet
Genre:
Management
Autor:
Ken Dunham, Jim Melnick
Herausgeber:
Taylor and Francis
Anzahl Seiten:
168
Erscheinungsdatum:
06.08.2008
ISBN:
978-1-4200-6903-7

Informationen zum Autor Dunham, Ken; Melnick, Jim Klappentext Originally designed to sabotage or annihilate websites, computerized "bots" are increasingly being used in mass spamming events, fraud, extortion, identity theft, and software theft. Focusing on the malicious use of bots and bot herder means and motivations, this volume provides a much needed resource for understanding the scope, sophistication, and criminal uses of bots and how to more proactively protect against them. Accessibly written, but with sufficient technical detail, the book introduces botnet threats and how they function and examines the top bot attacks against financial and government networks over the last four years to reveal the who, how, and why behind them. Zusammenfassung Describes the scope, sophistication, and criminal uses of bots and how to more pro actively protect against them. This book introduces botnet threats and how they function and examines the top bot attacks against financial and government networks. Inhaltsverzeichnis Introduction to Bots Thr34t Security Krew and the TK Worm Demonstration: How a Hacker Launches a Botnet Attack Introduction to the Use of Botnets in Criminal Activity Botnets and the eCrime Cycle: The iSIGHT Partners' Approach Technical Introduction to Bots Mitigation Glossary Bibliography

Autorentext
Dunham, Ken; Melnick, Jim

Klappentext
Originally designed to sabotage or annihilate websites, computerized "bots" are increasingly being used in mass spamming events, fraud, extortion, identity theft, and software theft. Focusing on the malicious use of bots and bot herder means and motivations, this volume provides a much needed resource for understanding the scope, sophistication, and criminal uses of bots and how to more proactively protect against them. Accessibly written, but with sufficient technical detail, the book introduces botnet threats and how they function and examines the top bot attacks against financial and government networks over the last four years to reveal the who, how, and why behind them.

Zusammenfassung
Describes the scope, sophistication, and criminal uses of bots and how to more pro actively protect against them. This book introduces botnet threats and how they function and examines the top bot attacks against financial and government networks.

Inhalt
Introduction to BotsThr34t Security Krew and the TK WormDemonstration: How a Hacker Launches a Botnet AttackIntroduction to the Use of Botnets in Criminal ActivityBotnets and the eCrime Cycle: The iSIGHT Partners' ApproachTechnical Introduction to BotsMitigationGlossaryBibliography


billigbuch.ch sucht jetzt für Sie die besten Angebote ...

Loading...

Die aktuellen Verkaufspreise von 6 Onlineshops werden in Realtime abgefragt.

Sie können das gewünschte Produkt anschliessend direkt beim Anbieter Ihrer Wahl bestellen.


Feedback