LEADER 02555nam 2200637Ia 450 001 9910826163403321 005 20200520144314.0 010 $a1-281-03587-4 010 $a9786611035877 010 $a0-08-048953-2 035 $a(CKB)1000000000246659 035 $a(EBL)254846 035 $a(OCoLC)559995733 035 $a(SSID)ssj0000221132 035 $a(PQKBManifestationID)11192012 035 $a(PQKBTitleCode)TC0000221132 035 $a(PQKBWorkID)10160274 035 $a(PQKB)10639980 035 $a(Au-PeEL)EBL254846 035 $a(CaPaEBR)ebr10110290 035 $a(CaONFJC)MIL103587 035 $a(OCoLC)935230510 035 $a(CaSebORM)9781597490306 035 $a(MiAaPQ)EBC254846 035 $a(OCoLC)824876115 035 $a(OCoLC)ocn824876115 035 $a(EXLCZ)991000000000246659 100 $a20051227d2005 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aPhishing exposed /$fLance James 205 $a1st edition 210 $aRockland, Mass. $cSyngress Pub.$dc2005 215 $a1 online resource (416 p.) 300 $aIncludes index. 311 $a1-59749-030-X 327 $aCover; Contents; Foreword; Chapter 1 Banking On Phishing; Chapter 2 Go Phish!; Chapter 3 E-Mail: The Weapon of Mass Delivery; Chapter 4 Crossing the Phishing Line; Chapter 5 The Dark Side of the Web; Chapter 6 Malware, Money Movers, and Ma Bell Mayhem!; Chapter 7 So Long, and Thanks for All the Phish!; Index; Related Titles 330 $aPhishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech 606 $aIdentity theft 606 $aInternet fraud 606 $aPhishing 615 0$aIdentity theft. 615 0$aInternet fraud. 615 0$aPhishing. 676 $a364.16/8 700 $aJames$b Lance$0627552 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910826163403321 996 $aPhishing exposed$91213077 997 $aUNINA