LEADER 03537nam a2200481Ii 4500 001 991003250149707536 006 m d 007 cr cn||||||||| 008 070806s2005 maua s 001 0 eng d 020 $a9781597490306 020 $a159749030X 035 $ab13655474-39ule_inst 037 $a115841:115939$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS 049 $aTEFA 082 04$a364.168$bJam$222 100 1 $aJames, Lance.$0627552 245 10$aPhishing exposed$h[electronic resource] /$cLance James ; foreward by Joe Stewart. 260 $aRockland, MA :$bSyngress,$cc2005. 300 $axviii, 395 p. :$bill. ;$c23 cm. 500 $aIncludes index. 505 0 $a1 The art of Research -- 2 Email Effectiveness -- 3 Where's The Money -- 4 Lawful Forensics -- 5 Malware and XSS 5 -- 6 Telephony Exploitation -- 7.0 Final Analysis. 505 0 $aBanking on phishing -- Go Phish!-- E-mail: the weapon of mass delivery -- Crossing the phishing line -- The dark side of the web -- Malware, money savers, and ma bell mayhem! -- So long, and thanks for all the phish! 520 $aPhishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers. * Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts * Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic * Stay one step ahead of the enemy with all the latest information. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on Aug. 2, 2007).$nAccess may be restricted to users at subscribing institutions. 650 0$aPhishing. 650 6$aRéseaux d'ordinateurs$xSécurité$xMesures. 650 6$aCriminalité informatique. 650 6$aFraude sur Internet. 650 6$aVol d'identité. 650 6$aPourriels. 650 6$aCommerce électronique$xPratiques déloyales 650 6$aHameçonnage 655 7$aElectronic books.$2local 700 1 $aStewart, Joe. 776 1 $cOriginal$z159749030X$z9781597490306$w(OCoLC)62408539 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9781597490306$zAn electronic book accessible through the World Wide Web; click for information 907 $a.b13655474$b24-02-22$c24-01-08 912 $a991003250149707536 994 $aC0$bTEF 996 $aPhishing exposed$91213077 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$gmau$h0$i0