Phishing exposed

Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will...

Full description

Bibliographic Details
Main Author: James, Lance
Format: eBook
Language:English
Published: Rockland, MA Syngress 2005, ©2005
Subjects:
Online Access:
Collection: Elsevier ScienceDirect eBooks - Collection details see MPG.ReNa
LEADER 02850nmm a2200433 u 4500
001 EB000906043
003 EBX01000000000000000701939
005 00000000000000.0
007 cr|||||||||||||||||||||
008 141222 ||| eng
020 |a 1597499951 
020 |a 9781597499958 
020 |a 9781423754305 
020 |a 9780080489537 
020 |a 1423754301 
020 |a 0080489532 
020 |a 159749030X 
020 |a 9781597490306 
100 1 |a James, Lance 
245 0 0 |a Phishing exposed  |h [electronic resource]  |h Elektronische Ressource  |c Lance James ; foreward by Joe Stewart 
260 |a Rockland, MA  |b Syngress  |c 2005, ©2005 
300 |a online resource (xviii, 395 pages)  |b illustrations 
505 0 |a the weapon of mass delivery -- Crossing the phishing line -- The dark side of the web -- Malware, money savers, and ma bell mayhem! -- So long, and thanks for all the phish! 
653 |a TRUE CRIME / White Collar Crime / bisacsh 
653 |a Criminalité informatique 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Vol d'identité 
653 |a Pourriels 
653 |a Commerce électronique / Pratiques déloyales 
653 |a Phishing 
653 |a Electronic mail systems / Security measures 
653 |a Hameçonnage 
653 |a Fraude sur Internet 
041 0 7 |a eng  |2 ISO 639-2 
989 |b ESD  |a Elsevier ScienceDirect eBooks 
500 |a Includes index 
856 4 0 |u http://www.sciencedirect.com/science/book/9781597490306  |x Verlag  |3 Volltext 
082 0 |a 364.168 
520 |a Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers. * Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts * Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic * Stay one step ahead of the enemy with all the latest information