LEADER 05258nam 2200661 a 450 001 9910143417103321 005 20170815121107.0 010 $a1-280-82196-5 010 $a9786610821969 010 $a0-470-08610-6 010 $a0-470-08609-2 035 $a(CKB)1000000000354640 035 $a(EBL)287285 035 $a(OCoLC)437176731 035 $a(SSID)ssj0000221131 035 $a(PQKBManifestationID)11175314 035 $a(PQKBTitleCode)TC0000221131 035 $a(PQKBWorkID)10157593 035 $a(PQKB)10163665 035 $a(MiAaPQ)EBC287285 035 $a(EXLCZ)991000000000354640 100 $a20060612d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aPhishing and countermeasures$b[electronic resource] $eunderstanding the increasing problem of electronic identity theft /$fedited by Markus Jakobsson, Steven Myers 210 $aHoboken, N.J. $cWiley-Interscience$dc2007 215 $a1 online resource (730 p.) 300 $aDescription based upon print version of record. 311 $a0-471-78245-9 320 $aIncludes bibliographical references and index. 327 $aPhishing and Countermeasures; CONTENTS; Preface; Acknowledgements; 1 Introduction to Phishing; 1.1 What is Phishing?; 1.2 A Brief History of Phishing; 1.3 The Costs to Society of Phishing; 1.4 A Typical Phishing Attack; 1.4.1 Phishing Example: America's Credit Unions; 1.4.2 Phishing Example: PayPal; 1.4.3 Making the Lure Convincing; 1.4.4 Setting The Hook; 1.4.5 Making the Hook Convincing; 1.4.6 The Catch; 1.4.7 Take-Down and Related Technologies; 1.5 Evolution of Phishing; 1.6 Case Study: Phishing on Froogle; 1.7 Protecting Users from Phishing; References 327 $a2 Phishing Attacks: Information Flow and Chokepoints2.1 Types of Phishing Attacks; 2.1.1 Deceptive Phishing; 2.1.2 Malware-Based Phishing; 2.1.3 DNS-Based Phishing ("Pharming"); 2.1.4 Content-Injection Phishing; 2.1.5 Man-in-the-Middle Phishing; 2.1.6 Search Engine Phishing; 2.2 Technology, Chokepoints, and Countermeasures; 2.2.1 Step 0: Preventing a Phishing Attack Before It Begins; 2.2.2 Step 1 : Preventing Delivery of Phishing Payload; 2.2.3 Step 2: Preventing or Disrupting a User Action; 2.2.4 Steps 2 and 4: Prevent Navigation and Data Compromise 327 $a2.2.5 Step 3: Preventing Transmission of the Prompt2.2.6 Step 4: Preventing Transmission of Confidential Information; 2.2.7 Steps 4 and 6: Preventing Data Entry and Rendering It Useless; 2.2.8 Step 5: Tracing Transmission of Compromised Credentials; 2.2.9 Step 6: Interfering with the Use of Compromised Information; 2.2.10 Step 7: Interfering with the Financial Benefit; References; 3 Spoofing and Countermeasures; 3.1 Email Spoofing; 3.1.1 Filtering; 3.1.2 Whitelisting and Greylisting; 3.1.3 Anti-spam Proposals; 3.1.4 User Education; 3.2 IP Spoofing; 3.2.1 IP Traceback 327 $a3.2.2 IP Spoofing Prevention3.2.3 Intradomain Spoofing; 3.3 Homograph Attacks Using Unicode; 3.3.1 Homograph Attacks; 3.3.2 Similar Unicode String Generation; 3.3.3 Methodology of Homograph Attack Detection; 3.4 Simulated Browser Attack; 3.4.1 Using the Illusion; 3.4.2 Web Spoofing; 3.4.3 SSL and Web Spoofing; 3.4.4 Ensnaring the User; 3.4.5 SpoofGuard Versus the Simulated Browser Attack; 3.5 Case Study: Warning the User About Active Web Spoofing; References; 4 Pharming and Client Side Attacks; 4.1 Malware; 4.1.1 Viruses and Worms; 4.1.2 Spyware; 4.1.3 Adware; 4.1.4 Browser Hijackers 327 $a4.1.5 Keyloggers4.1.6 Trojan Horses; 4.1.7 Rootkits; 4.1.8 Session Hijackers; 4.2 Malware Defense Strategies; 4.2.1 Defense Against Worms and Viruses; 4.2.2 Defense Against Spyware and Keyloggers; 4.2.3 Defense Against Rootkits; 4.3 Pharming; 4.3.1 Overview of DNS; 4.3.2 Role of DNS in Pharming; 4.3.3 Defense Against Pharming; 4.4 Case Study: Pharming with Appliances; 4.4.1 A Different Phishing Strategy; 4.4.2 The Spoof: A Home Pharming Appliance; 4.4.3 Sustainability of Distribution in the Online Marketplace; 4.4.4 Countermeasures; 4.5 Case Study: Race-Pharming; 4.5.1 Technical Description 327 $a4.5.2 Detection and Countermeasures 330 $aPhishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been mounting over the years, how to detect and prevent current as well as future attacks, this text focuses on corporations who supply the resources used by attackers. The authors subsequently deliberate on what action the government can take to respond to this situation and compare adequate versus inadequate countermeasures. 606 $aPhishing 606 $aIdentity theft$xPrevention 606 $aComputer security 608 $aElectronic books. 615 0$aPhishing. 615 0$aIdentity theft$xPrevention. 615 0$aComputer security. 676 $a005.9 676 $a364.163 701 $aJakobsson$b Markus$0858802 701 $aMyers$b Steven$f1975-$0969876 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910143417103321 996 $aPhishing and countermeasures$92204539 997 $aUNINA LEADER 01052nam0-2200301 --450 001 9910845697903321 005 20240419131914.0 010 $a9791255680130 020 $aIT$b2023-10308 100 $a20240419d2023----kmuy0itay5050 ba 101 0 $aita$cita 102 $aIT 105 $aa 001yy 200 1 $aCompetenze digitali e tecnologie didattiche$epercorsi per i futuri docenti di Formazione Primaria$fIolanda Sara Iannotta 210 $aLecce$cPensa multimedia$d2023 215 $a199 p.$cill.$d24 cm 225 1 $aUniversity, Teaching & Research$v7 320 $aContiene riferimenti bibl. (pp. 183-199) 610 0 $aScuole elementari [e] Scuole materne$aInsegnanti$aFormazione professionale$aImpiego [di] Internet 676 $a372.11$v23$zita 700 1$aIannotta,$bIolanda Sara$0752584 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910845697903321 952 $aCOLLEZ. 3282 (7)$b1856/2024$fFSPBC 959 $aFSPBC 996 $aCompetenze digitali e tecnologie didattiche$94154055 997 $aUNINA LEADER 04336nam 22006015 450 001 9910637716103321 005 20230724135811.0 010 $a9789811958526 010 $a9811958521 024 7 $a10.1007/978-981-19-5852-6 035 $a(MiAaPQ)EBC7165747 035 $a(Au-PeEL)EBL7165747 035 $a(CKB)25913867000041 035 $a(DE-He213)978-981-19-5852-6 035 $a(PPN)267815743 035 $a(EXLCZ)9925913867000041 100 $a20221228d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDesign and Development of Model Predictive Primary Control of Micro Grids $eSimulation Examples in MATLAB /$fby Puvvula Vidyasagar, K. Shanti Swarup 205 $a1st ed. 2023. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2023. 215 $a1 online resource (170 pages) $cillustrations 225 1 $aSpringer Tracts in Electrical and Electronics Engineering,$x2731-4219 311 08$a9789811958519 311 08$a9811958513 320 $aIncludes bibliographical references. 327 $aChapter 1. Micro-grid Introduction and Overview -- Chapter 2. An Overview of Micro-grid Control -- Chapter 3. Mathematical Modelling of a Micro-grid -- Chapter 4. Introduction to Model Predictive Control -- Chapter 5. LTI-MPC for the Micro-grid Control -- Chapter 6. LTV-MPC with Extended ?TAIL? -- Chapter 7. Special functions in the MPC formulation -- Chapter 8. Auxiliary Requirements for Real-time Implementation -- Chapter 9. Conclusion and Future Scope. . 330 $aThis book provides a design and development perspective MPC for micro-grid control, emphasizing step-by-step conversion of a nonlinear MPC to linear MPC preserving critical aspects of nonlinear MPC. The book discusses centralized and decentralized MPC control algorithms for a generic modern-day micro-grid consisting of vital essential constituents. It starts with the nonlinear MPC formulation for micro-grids. It also moves towards the linear time-invariant and linear time-variant approximations of the MPC for micro-grid control. The contents also discuss how the application of orthonormal special functions can improve computational complexity of MPC algorithms. It also highlights various auxiliary requirements like state estimator, disturbance compensator for robustness, selective harmonic eliminator for eliminating harmonics in the micro-grid, etc. These additional requirements are crucial for the successful online implementation of the MPC. In the end, the book shows how a well-designed MPC is superior in performance compared to the conventional micro-grid primary controllers discussed above. The key topics discussed in this book include ? the detailed modeling of micro-grid components; operational modes in micro-grid and their control objectives; conventional micro-grid primary controllers; the importance of MPC as a micro-grid primary controller; understanding of MPC operation; nonlinear MPC formulation; linear approximations of MPC; application of special functions in the MPC formulation; and other online requirements for the MPC implementation. The examples in the book are available both from a calculation point of view and as MATLAB codes. This helps the students get acquainted with the subject first and then allows them to implement the subject they learn in software for further understanding and research. 410 0$aSpringer Tracts in Electrical and Electronics Engineering,$x2731-4219 606 $aElectric power production 606 $aAutomatic control 606 $aElectrical Power Engineering 606 $aMechanical Power Engineering 606 $aControl and Systems Theory 615 0$aElectric power production. 615 0$aAutomatic control. 615 14$aElectrical Power Engineering. 615 24$aMechanical Power Engineering. 615 24$aControl and Systems Theory. 676 $a621.31 700 $aVidyasagar$b Puvvula$01274420 702 $aShanti Swarup$b K. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910637716103321 996 $aDesign and Development of Model Predictive Primary Control of Micro Grids$93566862 997 $aUNINA