Amazon cover image
Image from Amazon.com

Crimeware : understanding new attacks and defenses

By: Contributor(s): Material type: TextTextPublication details: Upper Saddle River, NJ : Addison-Wesley, c2008.Description: xxi, 582 p. : ill. ; 24 cmISBN:
  • 9780321501950
Subject(s): DDC classification:
  • 005.8 22 JAK-C
LOC classification:
  • QA76.9.A25 C75 2008
Online resources:
Contents:
Overview of crimeware -- A taxonomy of coding errors -- Crimeware and peer-to-peer networks -- Crimeware in small devices -- Crimeware in firmware -- Crimeware in the browser -- Bot networks -- Rootkits -- Virtual worlds and fraud -- Cybercrime and politics -- Online advertising fraud -- Crimeware business models -- The educational aspect of security -- Surreptitious code and the law -- Crimeware and trusted computing -- Technical defense techniques -- The future of crimeware.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Books Books IIITD Reference Computer Science and Engineering REF 005.8 JAK-C (Browse shelf(Opens below)) Available 000240
Total holds: 0

Includes bibliographical references (p. 525-556) and index.

Overview of crimeware -- A taxonomy of coding errors -- Crimeware and peer-to-peer networks -- Crimeware in small devices -- Crimeware in firmware -- Crimeware in the browser -- Bot networks -- Rootkits -- Virtual worlds and fraud -- Cybercrime and politics -- Online advertising fraud -- Crimeware business models -- The educational aspect of security -- Surreptitious code and the law -- Crimeware and trusted computing -- Technical defense techniques -- The future of crimeware.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in