LEADER 01293nam 2200409 450 001 9910808125603321 005 20230817190015.0 010 $a1-83909-693-4 035 $a(CKB)4950000000162521 035 $a(MiAaPQ)EBC5977938 035 $a(EXLCZ)994950000000162521 100 $a20191206d2019 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 04$aThe sharing economy $epromises and challenges /$fguest editors, Bo Xiao [and three others] 210 1$a[Place of publication not identified] :$cEmerald Publishing,$d2019. 215 $a1 online resource (221 pages) 225 1 $aInternet Research ;$vVolume 29, Number 5 311 $a1-83909-692-6 410 0$aInternet research ;$vVolume 29, Number 5. 606 $aTechnological innovations$xEconomic aspects 606 $aSharing$xEconomic aspects 615 0$aTechnological innovations$xEconomic aspects. 615 0$aSharing$xEconomic aspects. 676 $a338.064 700 $aCheung$b Christy$01688791 702 $aXiao$b Bo 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910808125603321 996 $aThe sharing economy$94063330 997 $aUNINA LEADER 03044nam 2200493 a 450 001 9910437564503321 005 20200520144314.0 010 $a1-4471-5216-6 024 7 $a10.1007/978-1-4471-5216-3 035 $a(OCoLC)852836277 035 $a(MiFhGG)GVRL6WSS 035 $a(CKB)2670000000400655 035 $a(MiAaPQ)EBC1317693 035 $a(EXLCZ)992670000000400655 100 $a20130418d2013 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt 182 $cc 183 $acr 200 00$aBotnets /$fHeli Tiirmaa-Klaar ... [et al.] 205 $a1st ed. 2013. 210 $aNew York $cSpringer$d2013 215 $a1 online resource (viii, 97 pages) $cillustrations (some color) 225 0$aSpringerBriefs in cybersecurity,$x2193-973X 300 $a"ISSN: 2193-973X." 311 $a1-4471-5215-8 320 $aIncludes bibliographical references. 327 $aForeword -- Botnets, Cybercrime and National Security -- Botnets: How to Fight the Ever-growing Threat on a Technical Level. 330 $aMalware poses one of the major threats to all currently operated computer systems. The scale of the problem becomes obvious by looking at the global economic loss caused by different kinds of malware, which is estimated to be more than US$ 10 billion every year. Botnets, a special kind of malware, are used to reap economic gains by criminals as well as for politically motivated activities. In contrast to other kinds of malware, botnets utilize a hidden communication channel to receive commands from their operator and communicate their current status. The ability to execute almost arbitrary commands on the infected machines makes botnets a general-purpose tool to perform malicious cyber-activities. Botnets provides a comprehensive analysis of the topic, and comprises both technical and non-technical sections written by leading cybersecurity experts. The non-technical section addresses how botnet infrastructure could be exploited for national security and cybercrime purposes. It approaches the subject as a public policy issue and analyzes the phenomenon of botnets from national security, law enforcement and regulatory policy perspectives, and makes recommendations for policy-makers on different public policies, highlighting the need for international response mechanisms. The technical section provides insight into current botnet techniques and discusses state-of-the-art countermeasures to combat the botnet threat in detail. It includes new detection methods as well as different approaches to actively compromise running botnets. 410 0$aSpringerBriefs in cybersecurity. 606 $aMalware (Computer software) 606 $aComputer security 615 0$aMalware (Computer software) 615 0$aComputer security. 676 $a005.84 701 $aTiirmaa-Klaar$b Heli$01060925 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910437564503321 996 $aBotnets$92516302 997 $aUNINA