![Computer Crimes: Keystroke Logging, Phishing, Cyber-Bullying, List of Convicted Computer Criminals, Cyberterrorism](//coverdb.com/reviewSE/w100/7ec/9781156992777.jpg) |
|
Computer Crimes: Keystroke Logging, Phishing, Cyber-Bullying, List of Convicted Computer Criminals, Cyberterrorism
Paperback. Books LLC 2010-05-26.
ISBN 9781156992777
|
|
|
Hitta bokens lägsta pris
|
Förlagets beskrivning
Purchase includes free access to book updates online and a free trial membership in the publisher's book club where you can select from more than a million books without charge. Chapters: Keystroke Logging, Phishing, Cyber-Bullying, List of Convicted Computer Criminals, Cyberterrorism, 2007 Cyberattacks on Estonia, Department of Defense Cyber Crime Center, Data Protection Act 1998, Computer Crime, Cyberstalking, Computer Misuse Act 1990, Network Crack Program Hacker Group, Scareware, Personal Jurisdiction Over International Defendants in the United States, Copyright Infringement of Software, Youth Internet Safety Survey, Cyber Spying, Masters of Deception, Sms Spoofing, Cyberattacks During the 2008 South Ossetia War, Computer Online Forensic Evidence Extractor, Online Predator, Legion of Doom, Cyber-Aggression in the Workplace, Cyber Defamation Law, Lee Ashurst, Harassment by Computer, Internet Abuse, Dark Mailer, Patriot Hacking, Computer Trespass, Impact. Excerpt: In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Even when using server authentication, it may require tremendous skill to detect that the website is fake. Phishing is an example of social engineering techniques used to fool users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user traini... More: http://booksllc.net/?id=428364
Liknande böckerComputer Crimes, Including: Keystroke Logging, Masters of Deception, Computer Crime, Phishing, Data Protection ACT 1998, Cyberterrorism, Scareware, Computer Misuse ACT 1990, Online Predator, Harassment by Computer, List of Convicted Computer Criminals
Recensioner
Den här boken har tyvärr inte några recensioner ännu. Om du redan läst boken, skriv en recension!
Recensera boken
Skriv en recension och dela dina åsikter med andra. Försök att fokusera på bokens innehåll. Läs våra instruktioner för mer information.
Computer Crimes: Keystroke Logging, Phishing, Cyber-Bullying, List of Convicted Computer Criminals, Cyberterrorism
Bokrecensioner » Computer Crimes: Keystroke Logging, Phishing, Cyber-Bullying, List of Convicted Computer Criminals, Cyberterrorism
|
|
![Computer Crimes: Keystroke Logging, Phishing, Cyber-Bullying, List of Convicted Computer Criminals, Cyberterrorism](/images/background.gif) |
![Computer Crimes: Keystroke Logging, Phishing, Cyber-Bullying, List of Convicted Computer Criminals, Cyberterrorism](/images/background.gif) |
|
|
|