The death of the Internet
"Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In additi...
Saved in:
Corporate Author: | ebrary, Inc |
---|---|
Other Authors: | Jakobsson, Markus |
Format: | Electronic eBook |
Language: | English |
Published: |
Hoboken, N.J. :
IEEE Press, Computer Society, Wiley, Higher Education Press,
2012.
|
Subjects: | |
Online Access: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
The death of the Internet
Published: (2012)
Published: (2012)
Internet security and firewalls
by: Preetham, V. V.
Published: (2002)
by: Preetham, V. V.
Published: (2002)
Internet security and firewalls
by: Preetham, V. V.
Published: (2002)
by: Preetham, V. V.
Published: (2002)
Internet security you can afford : using untangle as your internet gateway /
by: Dawson, Christopher
Published: (2015)
by: Dawson, Christopher
Published: (2015)
Internet security you can afford : using untangle as your internet gateway /
by: Dawson, Christopher
Published: (2015)
by: Dawson, Christopher
Published: (2015)
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Published: (2001)
Published: (2001)
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Published: (2001)
Published: (2001)
Special issue on internet security
Published: (2002)
Published: (2002)
Special issue on internet security
Published: (2002)
Published: (2002)
Network and security issues for internet mobile entertainment
Published: (2004)
Published: (2004)
Network and security issues for internet mobile entertainment
Published: (2004)
Published: (2004)
Privacy online : OECD guidance on policy and practice.
Published: (2003)
Published: (2003)
Privacy online : OECD guidance on policy and practice.
Published: (2003)
Published: (2003)
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone /
by: Canavan, Tom
Published: (2011)
by: Canavan, Tom
Published: (2011)
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone /
by: Canavan, Tom
Published: (2011)
by: Canavan, Tom
Published: (2011)
Web 2.0 security defending Ajax, RIA, and SOA /
by: Shah, Shreeraj
Published: (2008)
by: Shah, Shreeraj
Published: (2008)
Web 2.0 security defending Ajax, RIA, and SOA /
by: Shah, Shreeraj
Published: (2008)
by: Shah, Shreeraj
Published: (2008)
Cyber conflict competing national perspectives /
by: Ventre, Daniel
Published: (2012)
by: Ventre, Daniel
Published: (2012)
Cyber conflict competing national perspectives /
by: Ventre, Daniel
Published: (2012)
by: Ventre, Daniel
Published: (2012)
Advances in cyber security : technology, operations, and experiences /
Published: (2013)
Published: (2013)
Advances in cyber security : technology, operations, and experiences /
Published: (2013)
Published: (2013)
Designing network security : a practical guide to creating a secure network infrastructure /
by: Kaeo, Merike
Published: (2004)
by: Kaeo, Merike
Published: (2004)
Designing network security : a practical guide to creating a secure network infrastructure /
by: Kaeo, Merike
Published: (2004)
by: Kaeo, Merike
Published: (2004)
WordPress 3 ultimate security protect your WordPress site and its network /
by: Connelly, Olly
Published: (2011)
by: Connelly, Olly
Published: (2011)
WordPress 3 ultimate security protect your WordPress site and its network /
by: Connelly, Olly
Published: (2011)
by: Connelly, Olly
Published: (2011)
Cybersecurity : managing systems, conducting testing, and investigating intrusions /
by: Mowbray, Thomas J.
Published: (2014)
by: Mowbray, Thomas J.
Published: (2014)
Designing and building enterprise DMZs
by: Flynn, Hal
Published: (2006)
by: Flynn, Hal
Published: (2006)
IoT security issues /
by: Gilchrist, Alasdair
Published: (2017)
by: Gilchrist, Alasdair
Published: (2017)
Designing and building enterprise DMZs
by: Flynn, Hal
Published: (2006)
by: Flynn, Hal
Published: (2006)
Cybersecurity : managing systems, conducting testing, and investigating intrusions /
by: Mowbray, Thomas J.
Published: (2014)
by: Mowbray, Thomas J.
Published: (2014)
IoT security issues /
by: Gilchrist, Alasdair
Published: (2017)
by: Gilchrist, Alasdair
Published: (2017)
Google Hacking for Penetration Testers
by: Long, Johnny
Published: (2005)
by: Long, Johnny
Published: (2005)
The web application hacker's handbook finding and exploiting security flaws /
by: Stuttard, Dafydd
Published: (2011)
by: Stuttard, Dafydd
Published: (2011)
Google Hacking for Penetration Testers
by: Long, Johnny
Published: (2005)
by: Long, Johnny
Published: (2005)
The web application hacker's handbook finding and exploiting security flaws /
by: Stuttard, Dafydd
Published: (2011)
by: Stuttard, Dafydd
Published: (2011)
The dark sides of the Internet : on cyber threats and information warfare /
by: Heickerö, Roland
Published: (2013)
by: Heickerö, Roland
Published: (2013)
The dark sides of the Internet : on cyber threats and information warfare /
by: Heickerö, Roland
Published: (2013)
by: Heickerö, Roland
Published: (2013)
Android forensics investigation, analysis, and mobile security for Google Android /
by: Hoog, Andrew
Published: (2011)
by: Hoog, Andrew
Published: (2011)
Android forensics investigation, analysis, and mobile security for Google Android /
by: Hoog, Andrew
Published: (2011)
by: Hoog, Andrew
Published: (2011)
Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise /
by: Woody, Aaron
Published: (2013)
by: Woody, Aaron
Published: (2013)
Similar Items
-
The death of the Internet
Published: (2012) -
Internet security and firewalls
by: Preetham, V. V.
Published: (2002) -
Internet security and firewalls
by: Preetham, V. V.
Published: (2002) -
Internet security you can afford : using untangle as your internet gateway /
by: Dawson, Christopher
Published: (2015) -
Internet security you can afford : using untangle as your internet gateway /
by: Dawson, Christopher
Published: (2015)