LEADER 03649nmm a2200649 u 4500
001 EB001938782
003 EBX01000000000000001101684
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9780080489537 
020 |a 9781423754305 
020 |a 1423754301 
020 |a 1281035874 
020 |a 9781597490306 
020 |a 9781597499958 
020 |a 0080489532 
020 |a 159749030X 
020 |a 1597499951 
050 4 |a HV6773 
100 1 |a James, Lance 
245 0 0 |a Phishing exposed  |c Lance James ; foreward by Joe Stewart 
260 |a Rockland, MA  |b Syngress  |c 2005 
300 |a xviii, 395 pages  |b illustrations 
505 0 |a Banking on phishing -- Go Phish!-- E-mail: the weapon of mass delivery -- Crossing the phishing line -- The dark side of the web -- Malware, money savers, and ma bell mayhem! -- So long, and thanks for all the phish! 
653 |a TRUE CRIME / White Collar Crime / bisacsh 
653 |a Criminalité informatique 
653 |a Computer crimes / fast 
653 |a Phishing / fast 
653 |a Computer crimes / http://id.loc.gov/authorities/subjects/sh85029492 
653 |a Spam (Electronic mail) / http://id.loc.gov/authorities/subjects/sh98004365 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Fraude informatique 
653 |a Spam (Electronic mail) / fast 
653 |a Electronic commerce / Corrupt practices 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Hameçonnage 
653 |a Computer networks / Security measures / fast 
653 |a Commerce électronique / Pratiques déloyales 
653 |a Phishing / http://id.loc.gov/authorities/subjects/sh2005003206 
653 |a Pourriels 
653 |a Identity theft / fast 
653 |a Vol d'identité 
653 |a Identity theft / http://id.loc.gov/authorities/subjects/sh2004003368 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
776 |z 1423754301 
776 |z 1597499951 
776 |z 9781423754305 
776 |z 9781597499958 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597490306/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 381.1 
082 0 |a 381 
082 0 |a 364.168 
082 0 |a 364.1 
520 |a Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers. * Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts * Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic * Stay one step ahead of the enemy with all the latest information