Bild 1 von 1
Galerie
Bild 1 von 1

Ähnlichen Artikel verkaufen?
Malicious Bots by Dunham
Sk1drow Books
(3411)
Gewerblich
US $23,99
Ca.CHF 19,32
Artikelzustand:
“Used book in good condition. Shows typical wear. Quick shipping. Satisfaction guaranteed!”
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Versand:
US $6,99 (ca. CHF 5,63) USPS Media MailTM.
Standort: Multiple Locations, USA
Lieferung:
Lieferung zwischen Di, 25. Nov und Mi, 3. Dez nach 94104 bei heutigem Zahlungseingang
Rücknahme:
30 Tage Rückgabe. Käufer zahlt Rückversand. Wenn Sie ein eBay-Versandetikett verwenden, werden die Kosten dafür von Ihrer Rückerstattung abgezogen.
Zahlungen:
Sicher einkaufen
Info zum Artikel
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:136689643535
Artikelmerkmale
- Artikelzustand
- Gut
- Hinweise des Verkäufers
- “Used book in good condition. Shows typical wear. Quick shipping. Satisfaction guaranteed!”
- Book Title
- Malicious Bots
- Narrative Type
- True Crime
- Genre
- N/A
- Intended Audience
- N/A
- ISBN
- 9781420069037
Über dieses Produkt
Product Identifiers
Publisher
Auerbach Publishers, Incorporated
ISBN-10
1420069039
ISBN-13
9781420069037
eBay Product ID (ePID)
61646880
Product Key Features
Number of Pages
168 Pages
Language
English
Publication Name
Malicious Bots : an inside Look Into the Cyber-Criminal Underground of the Internet
Subject
Security / General, Information Management, Security / Networking, Information Technology
Publication Year
2008
Type
Textbook
Subject Area
Computers, Business & Economics
Format
Hardcover
Dimensions
Item Height
0.6 in
Item Weight
14.4 Oz
Item Length
9.6 in
Item Width
6.5 in
Additional Product Features
Intended Audience
College Audience
LCCN
2008-010309
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
364.16/8
Table Of Content
Introduction to Bots Thr34t Security Krew and the TK Worm Demonstration: How a Hacker Launches a Botnet Attack Introduction to the Use of Botnets in Criminal Activity Botnets and the eCrime Cycle: The iSIGHT Partners' Approach Technical Introduction to Bots Mitigation Glossary Bibliography
Synopsis
Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise of dangerous bots and exposes the nefarious methods of "botmasters". This valuable resource assists information security managers in understanding the scope, sophistication, and criminal uses of bots. With sufficient technical detail to empower IT professionals, this volume provides in-depth coverage of the top bot attacks against financial and government networks over the last several years. The book presents exclusive details of the operation of the notorious Thr34t Krew, one of the most malicious bot herder groups in recent history. Largely unidentified by anti-virus companies, their bots spread globally for months, launching massive distributed denial of service (DDoS) attacks and warez (stolen software distributions). For the first time, this story is publicly revealed, showing how the botherders got arrested, along with details on other bots in the world today. Unique descriptions of the criminal marketplace - how criminals make money off of your computer - are also a focus of this exclusive book! With unprecedented detail, the book goes on to explain step-by-step how a hacker launches a botnet attack, providing specifics that only those entrenched in the cyber-crime investigation world could possibly offer. Authors Ken Dunham and Jim Melnick serve on the front line of critical cyber-attacks and countermeasures as experts in the deployment of geopolitical and technical bots. Their work involves advising upper-level government officials and executives who control some of the largest networks in the world. By examining the methods of Internet predators, information security managers will be better able to proactively prote, Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise of dangerous bots and exposes the nefarious methods of "botmasters". This valuable resource assists information security managers in understanding the scope, sophistication, and criminal uses of bots. With sufficient technical detail to empower IT professionals, this volume provides in-depth coverage of the top bot attacks against financial and government networks over the last several years. The book presents exclusive details of the operation of the notorious Thr34t Krew , one of the most malicious bot herder groups in recent history. Largely unidentified by anti-virus companies, their bots spread globally for months, launching massive distributed denial of service (DDoS) attacks and warez (stolen software distributions). For the first time, this story is publicly revealed, showing how the botherders got arrested, along with details on other bots in the world today. Unique descriptions of the criminal marketplace - how criminals make money off of your computer - are also a focus of this exclusive book! With unprecedented detail, the book goes on to explain step-by-step how a hacker launches a botnet attack, providing specifics that only those entrenched in the cyber-crime investigation world could possibly offer. Authors Ken Dunham and Jim Melnick serve on the front line of critical cyber-attacks and countermeasures as experts in the deployment of geopolitical and technical bots. Their work involves advising upper-level government officials and executives who control some of the largest networks in the world. By examining the methods of Internet predators, information security managers will be better able to proactively prote, Originally designed to sabotage or annihilate websites, computerized "Bots" are increasingly used in mass spamming events, fraud, extortion, identity theft, and software theft. Focusing on the malicious use of bots and bot herder means and motivations, Malicious Bots provides a much needed a resource for understanding the scope, sophistication, and criminal uses of bots and how to more proactively protect against them. Accessibly written, but with sufficient technical detail, the book introduces botnet threats and how they function and examines the top bot attacks against financial and government networks over the last four years to reveal the who, how, and why behind them., Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise of dangerous bots and exposes the nefarious methods of "botmasters". This valuable resource assists information security managers in understanding the scope, sophistication, and criminal uses of bots. With sufficient technical detail to empower IT professionals, this volume provides in-depth coverage of the top bot attacks against financial and government networks over the last several years. The book presents exclusive details of the operation of the notorious Thr34t Krew , one of the most malicious bot herder groups in recent history. Largely unidentified by anti-virus companies, their bots spread globally for months, launching massive distributed denial of service (DDoS) attacks and warez (stolen software distributions). For the first time, this story is publicly revealed, showing how the botherders got arrested, along with details on other bots in the world today. Unique descriptions of the criminal marketplace - how criminals make money off of your computer - are also a focus of this exclusive book With unprecedented detail, the book goes on to explain step-by-step how a hacker launches a botnet attack, providing specifics that only those entrenched in the cyber-crime investigation world could possibly offer. Authors Ken Dunham and Jim Melnick serve on the front line of critical cyber-attacks and countermeasures as experts in the deployment of geopolitical and technical bots. Their work involves advising upper-level government officials and executives who control some of the largest networks in the world. By examining the methods of Internet predators, information security managers will be better able to proactively prote
LC Classification Number
HV6773.D86 2008
Artikelbeschreibung des Verkäufers
Info zu diesem Verkäufer
Sk1drow Books
96,7% positive Bewertungen•14 Tsd. Artikel verkauft
Angemeldet als gewerblicher Verkäufer
Verkäuferbewertungen (2'951)
- t***c (532)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufThis item was never shipped but U.S.P.S. showed it as having been delivered. After I contacted the seller, they discovered that it had not been shipped and they did not have one to ship me, so they immediately refunded my money. Seller responded quickly to my inquiry and quickly gave me a refund. Would buy from them again.Exploring Proverbs, Volume 1 (John Phillips Commentary Series) by Phillips (Nr. 146486555200)
- o***- (4)- Bewertung vom Käufer.Letzter MonatBestätigter KaufTimely delivery. Well packaged and arrived in good condition. Item was as described. I was happy with the price. Most people selling these volumes charge collectors prices. Seller offered a fair price.
- o***o (251)- Bewertung vom Käufer.Letzte 6 MonateBestätigter KaufFast shipping, great packaging, item as described, good value, awesome seller, thank you, A+++Writings 1997-2003 by CCRU (Nr. 135894994311)