The death of the Internet
"Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In additi...
Sábháilte in:
Údar corparáideach: | ebrary, Inc |
---|---|
Rannpháirtithe: | Jakobsson, Markus |
Formáid: | Leictreonach Ríomhleabhar |
Teanga: | Béarla |
Foilsithe / Cruthaithe: |
Hoboken, N.J. :
IEEE Press, Computer Society, Wiley, Higher Education Press,
2012.
|
Ábhair: | |
Rochtain ar líne: | An electronic book accessible through the World Wide Web; click to view |
Clibeanna: |
Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
|
Míreanna comhchosúla
Internet security and firewalls
de réir: Preetham, V. V.
Foilsithe / Cruthaithe: (2002)
de réir: Preetham, V. V.
Foilsithe / Cruthaithe: (2002)
Internet security you can afford : using untangle as your internet gateway /
de réir: Dawson, Christopher
Foilsithe / Cruthaithe: (2015)
de réir: Dawson, Christopher
Foilsithe / Cruthaithe: (2015)
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Foilsithe / Cruthaithe: (2001)
Foilsithe / Cruthaithe: (2001)
Network and security issues for internet mobile entertainment
Foilsithe / Cruthaithe: (2004)
Foilsithe / Cruthaithe: (2004)
Special issue on internet security
Foilsithe / Cruthaithe: (2002)
Foilsithe / Cruthaithe: (2002)
Privacy online : OECD guidance on policy and practice.
Foilsithe / Cruthaithe: (2003)
Foilsithe / Cruthaithe: (2003)
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone /
de réir: Canavan, Tom
Foilsithe / Cruthaithe: (2011)
de réir: Canavan, Tom
Foilsithe / Cruthaithe: (2011)
Web 2.0 security defending Ajax, RIA, and SOA /
de réir: Shah, Shreeraj
Foilsithe / Cruthaithe: (2008)
de réir: Shah, Shreeraj
Foilsithe / Cruthaithe: (2008)
WordPress 3 ultimate security protect your WordPress site and its network /
de réir: Connelly, Olly
Foilsithe / Cruthaithe: (2011)
de réir: Connelly, Olly
Foilsithe / Cruthaithe: (2011)
Cyber conflict competing national perspectives /
de réir: Ventre, Daniel
Foilsithe / Cruthaithe: (2012)
de réir: Ventre, Daniel
Foilsithe / Cruthaithe: (2012)
Advances in cyber security : technology, operations, and experiences /
Foilsithe / Cruthaithe: (2013)
Foilsithe / Cruthaithe: (2013)
Designing network security : a practical guide to creating a secure network infrastructure /
de réir: Kaeo, Merike
Foilsithe / Cruthaithe: (2004)
de réir: Kaeo, Merike
Foilsithe / Cruthaithe: (2004)
Designing and building enterprise DMZs
de réir: Flynn, Hal
Foilsithe / Cruthaithe: (2006)
de réir: Flynn, Hal
Foilsithe / Cruthaithe: (2006)
IoT security issues /
de réir: Gilchrist, Alasdair
Foilsithe / Cruthaithe: (2017)
de réir: Gilchrist, Alasdair
Foilsithe / Cruthaithe: (2017)
Cybersecurity : managing systems, conducting testing, and investigating intrusions /
de réir: Mowbray, Thomas J.
Foilsithe / Cruthaithe: (2014)
de réir: Mowbray, Thomas J.
Foilsithe / Cruthaithe: (2014)
Android forensics investigation, analysis, and mobile security for Google Android /
de réir: Hoog, Andrew
Foilsithe / Cruthaithe: (2011)
de réir: Hoog, Andrew
Foilsithe / Cruthaithe: (2011)
Google Hacking for Penetration Testers
de réir: Long, Johnny
Foilsithe / Cruthaithe: (2005)
de réir: Long, Johnny
Foilsithe / Cruthaithe: (2005)
The web application hacker's handbook finding and exploiting security flaws /
de réir: Stuttard, Dafydd
Foilsithe / Cruthaithe: (2011)
de réir: Stuttard, Dafydd
Foilsithe / Cruthaithe: (2011)
The dark sides of the Internet : on cyber threats and information warfare /
de réir: Heickerö, Roland
Foilsithe / Cruthaithe: (2013)
de réir: Heickerö, Roland
Foilsithe / Cruthaithe: (2013)
The secure online business handbook a practical guide to risk management and business continuity /
Foilsithe / Cruthaithe: (2006)
Foilsithe / Cruthaithe: (2006)
Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise /
de réir: Woody, Aaron
Foilsithe / Cruthaithe: (2013)
de réir: Woody, Aaron
Foilsithe / Cruthaithe: (2013)
The science of cybersecurity and a roadmap to research
Foilsithe / Cruthaithe: (2011)
Foilsithe / Cruthaithe: (2011)
Use of risk analysis in computer-aided persuasion
Foilsithe / Cruthaithe: (2011)
Foilsithe / Cruthaithe: (2011)
The future of the Internet and how to stop it
de réir: Zittrain, Jonathan (Jonathan L.), 1969-
Foilsithe / Cruthaithe: (2008)
de réir: Zittrain, Jonathan (Jonathan L.), 1969-
Foilsithe / Cruthaithe: (2008)
Towards the future internet emerging trends from European research /
Foilsithe / Cruthaithe: (2010)
Foilsithe / Cruthaithe: (2010)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
de réir: Winterfeld, Steve
Foilsithe / Cruthaithe: (2013)
de réir: Winterfeld, Steve
Foilsithe / Cruthaithe: (2013)
SSL and TLS theory and practice /
de réir: Oppliger, Rolf
Foilsithe / Cruthaithe: (2009)
de réir: Oppliger, Rolf
Foilsithe / Cruthaithe: (2009)
Hacking web apps detecting and preventing web application security problems /
de réir: Shema, Mike
Foilsithe / Cruthaithe: (2012)
de réir: Shema, Mike
Foilsithe / Cruthaithe: (2012)
Part-themed issue on internet security
Foilsithe / Cruthaithe: (2006)
Foilsithe / Cruthaithe: (2006)
Essentials of online payment security and fraud prevention
de réir: Montague, David A., 1967-
Foilsithe / Cruthaithe: (2010)
de réir: Montague, David A., 1967-
Foilsithe / Cruthaithe: (2010)
Comprehensive approach as 'sine qua non' for critical infrastructure protection /
Foilsithe / Cruthaithe: (2015)
Foilsithe / Cruthaithe: (2015)
Control and security of E-commerce
de réir: Smith, Gordon E. (Gordon Edward)
Foilsithe / Cruthaithe: (2004)
de réir: Smith, Gordon E. (Gordon Edward)
Foilsithe / Cruthaithe: (2004)
The basics of web hacking tools and techniques to attack the Web /
de réir: Pauli, Joshua J.
Foilsithe / Cruthaithe: (2013)
de réir: Pauli, Joshua J.
Foilsithe / Cruthaithe: (2013)
Understanding Voice over IP security
de réir: Johnston, Alan B.
Foilsithe / Cruthaithe: (2006)
de réir: Johnston, Alan B.
Foilsithe / Cruthaithe: (2006)
Business continuity planning for data centers and systems a strategic implementation guide /
de réir: Bowman, Ronald H., 1960-
Foilsithe / Cruthaithe: (2008)
de réir: Bowman, Ronald H., 1960-
Foilsithe / Cruthaithe: (2008)
Cybersecurity public sector threats and responses /
Foilsithe / Cruthaithe: (2012)
Foilsithe / Cruthaithe: (2012)
The business blockchain : promise, practice, and application of the next Internet technology /
de réir: Mougayar, William
Foilsithe / Cruthaithe: (2016)
de réir: Mougayar, William
Foilsithe / Cruthaithe: (2016)
Z/OS WebSphere and J2EE security handbook
Foilsithe / Cruthaithe: (2003)
Foilsithe / Cruthaithe: (2003)
Insider threat protecting the enterprise from sabotage, spying, and theft /
de réir: Cole, Eric
Foilsithe / Cruthaithe: (2006)
de réir: Cole, Eric
Foilsithe / Cruthaithe: (2006)
Distributed systems security issues, processes, and solutions /
Foilsithe / Cruthaithe: (2009)
Foilsithe / Cruthaithe: (2009)
Míreanna comhchosúla
-
Internet security and firewalls
de réir: Preetham, V. V.
Foilsithe / Cruthaithe: (2002) -
Internet security you can afford : using untangle as your internet gateway /
de réir: Dawson, Christopher
Foilsithe / Cruthaithe: (2015) -
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Foilsithe / Cruthaithe: (2001) -
Network and security issues for internet mobile entertainment
Foilsithe / Cruthaithe: (2004) -
Special issue on internet security
Foilsithe / Cruthaithe: (2002)