E-Book, Englisch, 192 Seiten, Format (B × H): 191 mm x 235 mm
Timm / Perez Seven Deadliest Social Network Attacks
1. Auflage 2010
ISBN: 978-1-59749-546-2
Verlag: Academic Press
Format: EPUB
Kopierschutz: 6 - ePub Watermark
E-Book, Englisch, 192 Seiten, Format (B × H): 191 mm x 235 mm
ISBN: 978-1-59749-546-2
Verlag: Academic Press
Format: EPUB
Kopierschutz: 6 - ePub Watermark
Seven Deadliest Social Network Attacks provides a comprehensive view into how social networking attacks have impacted the livelihood and lives of adults and children. The book is separated into seven chapters, with each focusing on a specific type of attack that has been furthered through the use of social networking tools and devices. These are: (i) social networking infrastructure attacks; (ii) malware attacks; (iii) phishing attacks; (iv) Evil Twin Attacks; (v) identity theft; (vi) cyberbullying; and (vii) physical threat. Each chapter takes readers through a comprehensive overview of a particular attack to demonstrate how it was used, what was accomplished as a result, and the ensuing consequences. Alongside examining the anatomy of the attacks, insight will be gained into how to develop mitigation strategies, including forecasts of where these types of attacks are heading.
This book can serve as a reference guide to anyone who is or will be involved in oversight roles within the information security field. It will also benefit those involved or interested in providing defense mechanisms surrounding social media as well as information security professionals, those in the teaching profession, and all levels of professional management.
- Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
- Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
- Institute countermeasures, don't be caught defenseless again, and learn techniques to make your computer and network impenetrable
Zielgruppe
<p>Information security professionals of all levels; recreational hackers</p>
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Introduction Chapter 1. Social Networking Infrastructure Attacks Chapter 2. Malware Attacks Chapter 3. Phishing Attacks Chapter 4. Evil Twin Attacks Chapter 5. Identity Theft Chapter 6. Cyber Bullying Chapter 7. Physical Threats