The death of the Internet
"Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In additi...
Gardado en:
Autor Corporativo: | ebrary, Inc |
---|---|
Outros autores: | Jakobsson, Markus |
Formato: | Electrónico eBook |
Idioma: | inglés |
Publicado: |
Hoboken, N.J. :
IEEE Press, Computer Society, Wiley, Higher Education Press,
2012.
|
Subjects: | |
Acceso en liña: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Engadir etiqueta
Sen Etiquetas, Sexa o primeiro en etiquetar este rexistro!
|
Títulos similares
Internet security and firewalls
por: Preetham, V. V.
Publicado: (2002)
por: Preetham, V. V.
Publicado: (2002)
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Publicado: (2001)
Publicado: (2001)
Internet security you can afford : using untangle as your internet gateway /
por: Dawson, Christopher
Publicado: (2015)
por: Dawson, Christopher
Publicado: (2015)
Network and security issues for internet mobile entertainment
Publicado: (2004)
Publicado: (2004)
Special issue on internet security
Publicado: (2002)
Publicado: (2002)
Privacy online : OECD guidance on policy and practice.
Publicado: (2003)
Publicado: (2003)
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone /
por: Canavan, Tom
Publicado: (2011)
por: Canavan, Tom
Publicado: (2011)
Web 2.0 security defending Ajax, RIA, and SOA /
por: Shah, Shreeraj
Publicado: (2008)
por: Shah, Shreeraj
Publicado: (2008)
WordPress 3 ultimate security protect your WordPress site and its network /
por: Connelly, Olly
Publicado: (2011)
por: Connelly, Olly
Publicado: (2011)
Cyber conflict competing national perspectives /
por: Ventre, Daniel
Publicado: (2012)
por: Ventre, Daniel
Publicado: (2012)
Advances in cyber security : technology, operations, and experiences /
Publicado: (2013)
Publicado: (2013)
Designing network security : a practical guide to creating a secure network infrastructure /
por: Kaeo, Merike
Publicado: (2004)
por: Kaeo, Merike
Publicado: (2004)
Designing and building enterprise DMZs
por: Flynn, Hal
Publicado: (2006)
por: Flynn, Hal
Publicado: (2006)
Cybersecurity : managing systems, conducting testing, and investigating intrusions /
por: Mowbray, Thomas J.
Publicado: (2014)
por: Mowbray, Thomas J.
Publicado: (2014)
IoT security issues /
por: Gilchrist, Alasdair
Publicado: (2017)
por: Gilchrist, Alasdair
Publicado: (2017)
Google Hacking for Penetration Testers
por: Long, Johnny
Publicado: (2005)
por: Long, Johnny
Publicado: (2005)
The web application hacker's handbook finding and exploiting security flaws /
por: Stuttard, Dafydd
Publicado: (2011)
por: Stuttard, Dafydd
Publicado: (2011)
Android forensics investigation, analysis, and mobile security for Google Android /
por: Hoog, Andrew
Publicado: (2011)
por: Hoog, Andrew
Publicado: (2011)
The dark sides of the Internet : on cyber threats and information warfare /
por: Heickerö, Roland
Publicado: (2013)
por: Heickerö, Roland
Publicado: (2013)
The secure online business handbook a practical guide to risk management and business continuity /
Publicado: (2006)
Publicado: (2006)
Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise /
por: Woody, Aaron
Publicado: (2013)
por: Woody, Aaron
Publicado: (2013)
The science of cybersecurity and a roadmap to research
Publicado: (2011)
Publicado: (2011)
The future of the Internet and how to stop it
por: Zittrain, Jonathan (Jonathan L.), 1969-
Publicado: (2008)
por: Zittrain, Jonathan (Jonathan L.), 1969-
Publicado: (2008)
Use of risk analysis in computer-aided persuasion
Publicado: (2011)
Publicado: (2011)
Towards the future internet emerging trends from European research /
Publicado: (2010)
Publicado: (2010)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
por: Winterfeld, Steve
Publicado: (2013)
por: Winterfeld, Steve
Publicado: (2013)
SSL and TLS theory and practice /
por: Oppliger, Rolf
Publicado: (2009)
por: Oppliger, Rolf
Publicado: (2009)
Hacking web apps detecting and preventing web application security problems /
por: Shema, Mike
Publicado: (2012)
por: Shema, Mike
Publicado: (2012)
Part-themed issue on internet security
Publicado: (2006)
Publicado: (2006)
Essentials of online payment security and fraud prevention
por: Montague, David A., 1967-
Publicado: (2010)
por: Montague, David A., 1967-
Publicado: (2010)
Control and security of E-commerce
por: Smith, Gordon E. (Gordon Edward)
Publicado: (2004)
por: Smith, Gordon E. (Gordon Edward)
Publicado: (2004)
Comprehensive approach as 'sine qua non' for critical infrastructure protection /
Publicado: (2015)
Publicado: (2015)
The basics of web hacking tools and techniques to attack the Web /
por: Pauli, Joshua J.
Publicado: (2013)
por: Pauli, Joshua J.
Publicado: (2013)
Understanding Voice over IP security
por: Johnston, Alan B.
Publicado: (2006)
por: Johnston, Alan B.
Publicado: (2006)
Business continuity planning for data centers and systems a strategic implementation guide /
por: Bowman, Ronald H., 1960-
Publicado: (2008)
por: Bowman, Ronald H., 1960-
Publicado: (2008)
Cybersecurity public sector threats and responses /
Publicado: (2012)
Publicado: (2012)
The business blockchain : promise, practice, and application of the next Internet technology /
por: Mougayar, William
Publicado: (2016)
por: Mougayar, William
Publicado: (2016)
Z/OS WebSphere and J2EE security handbook
Publicado: (2003)
Publicado: (2003)
Insider threat protecting the enterprise from sabotage, spying, and theft /
por: Cole, Eric
Publicado: (2006)
por: Cole, Eric
Publicado: (2006)
Distributed systems security issues, processes, and solutions /
Publicado: (2009)
Publicado: (2009)
Títulos similares
-
Internet security and firewalls
por: Preetham, V. V.
Publicado: (2002) -
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Publicado: (2001) -
Internet security you can afford : using untangle as your internet gateway /
por: Dawson, Christopher
Publicado: (2015) -
Network and security issues for internet mobile entertainment
Publicado: (2004) -
Special issue on internet security
Publicado: (2002)