03537nam a2200481Ii 4500991003250149707536m d cr cn|||||||||070806s2005 maua s 001 0 eng d9781597490306159749030Xb13655474-39ule_inst115841:115939Elsevier Science & Technologyhttp://www.sciencedirect.comOPELSOPELSTEFA364.168Jam22James, Lance.627552Phishing exposed[electronic resource] /Lance James ; foreward by Joe Stewart.Rockland, MA :Syngress,c2005.xviii, 395 p. :ill. ;23 cm.Includes index.1 The art of Research -- 2 Email Effectiveness -- 3 Where's The Money -- 4 Lawful Forensics -- 5 Malware and XSS 5 -- 6 Telephony Exploitation -- 7.0 Final Analysis.Banking on phishing -- Go Phish!-- E-mail: the weapon of mass delivery -- Crossing the phishing line -- The dark side of the web -- Malware, money savers, and ma bell mayhem! -- So long, and thanks for all the phish!Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers. * Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts * Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic * Stay one step ahead of the enemy with all the latest information.Electronic reproduction.Amsterdam :Elsevier Science & Technology,2007.Mode of access: World Wide Web.System requirements: Web browser.Title from title screen (viewed on Aug. 2, 2007).Access may be restricted to users at subscribing institutions.Phishing.Réseaux d'ordinateursSécuritéMesures.Criminalité informatique.Fraude sur Internet.Vol d'identité.Pourriels.Commerce électroniquePratiques déloyalesHameçonnageElectronic books.localStewart, Joe.Original159749030X9781597490306(OCoLC)62408539Referexhttp://www.sciencedirect.com/science/book/9781597490306An electronic book accessible through the World Wide Web; click for information.b1365547424-02-2224-01-08991003250149707536C0TEFPhishing exposed1213077UNISALENTOle02924-01-08mm -engmau00