The death of the Internet
"Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In additi...
I tiakina i:
Kaituhi rangatōpū: | ebrary, Inc |
---|---|
Ētahi atu kaituhi: | Jakobsson, Markus |
Hōputu: | Tāhiko īPukapuka |
Reo: | Ingarihi |
I whakaputaina: |
Hoboken, N.J. :
IEEE Press, Computer Society, Wiley, Higher Education Press,
2012.
|
Ngā marau: | |
Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Ngā tūemi rite
Internet security and firewalls
mā: Preetham, V. V.
I whakaputaina: (2002)
mā: Preetham, V. V.
I whakaputaina: (2002)
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
I whakaputaina: (2001)
I whakaputaina: (2001)
Internet security you can afford : using untangle as your internet gateway /
mā: Dawson, Christopher
I whakaputaina: (2015)
mā: Dawson, Christopher
I whakaputaina: (2015)
Network and security issues for internet mobile entertainment
I whakaputaina: (2004)
I whakaputaina: (2004)
Special issue on internet security
I whakaputaina: (2002)
I whakaputaina: (2002)
Privacy online : OECD guidance on policy and practice.
I whakaputaina: (2003)
I whakaputaina: (2003)
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone /
mā: Canavan, Tom
I whakaputaina: (2011)
mā: Canavan, Tom
I whakaputaina: (2011)
Web 2.0 security defending Ajax, RIA, and SOA /
mā: Shah, Shreeraj
I whakaputaina: (2008)
mā: Shah, Shreeraj
I whakaputaina: (2008)
WordPress 3 ultimate security protect your WordPress site and its network /
mā: Connelly, Olly
I whakaputaina: (2011)
mā: Connelly, Olly
I whakaputaina: (2011)
Cyber conflict competing national perspectives /
mā: Ventre, Daniel
I whakaputaina: (2012)
mā: Ventre, Daniel
I whakaputaina: (2012)
Advances in cyber security : technology, operations, and experiences /
I whakaputaina: (2013)
I whakaputaina: (2013)
Designing network security : a practical guide to creating a secure network infrastructure /
mā: Kaeo, Merike
I whakaputaina: (2004)
mā: Kaeo, Merike
I whakaputaina: (2004)
Designing and building enterprise DMZs
mā: Flynn, Hal
I whakaputaina: (2006)
mā: Flynn, Hal
I whakaputaina: (2006)
Cybersecurity : managing systems, conducting testing, and investigating intrusions /
mā: Mowbray, Thomas J.
I whakaputaina: (2014)
mā: Mowbray, Thomas J.
I whakaputaina: (2014)
IoT security issues /
mā: Gilchrist, Alasdair
I whakaputaina: (2017)
mā: Gilchrist, Alasdair
I whakaputaina: (2017)
Google Hacking for Penetration Testers
mā: Long, Johnny
I whakaputaina: (2005)
mā: Long, Johnny
I whakaputaina: (2005)
The web application hacker's handbook finding and exploiting security flaws /
mā: Stuttard, Dafydd
I whakaputaina: (2011)
mā: Stuttard, Dafydd
I whakaputaina: (2011)
Android forensics investigation, analysis, and mobile security for Google Android /
mā: Hoog, Andrew
I whakaputaina: (2011)
mā: Hoog, Andrew
I whakaputaina: (2011)
The dark sides of the Internet : on cyber threats and information warfare /
mā: Heickerö, Roland
I whakaputaina: (2013)
mā: Heickerö, Roland
I whakaputaina: (2013)
Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise /
mā: Woody, Aaron
I whakaputaina: (2013)
mā: Woody, Aaron
I whakaputaina: (2013)
The secure online business handbook a practical guide to risk management and business continuity /
I whakaputaina: (2006)
I whakaputaina: (2006)
The science of cybersecurity and a roadmap to research
I whakaputaina: (2011)
I whakaputaina: (2011)
The future of the Internet and how to stop it
mā: Zittrain, Jonathan (Jonathan L.), 1969-
I whakaputaina: (2008)
mā: Zittrain, Jonathan (Jonathan L.), 1969-
I whakaputaina: (2008)
Use of risk analysis in computer-aided persuasion
I whakaputaina: (2011)
I whakaputaina: (2011)
Towards the future internet emerging trends from European research /
I whakaputaina: (2010)
I whakaputaina: (2010)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
mā: Winterfeld, Steve
I whakaputaina: (2013)
mā: Winterfeld, Steve
I whakaputaina: (2013)
SSL and TLS theory and practice /
mā: Oppliger, Rolf
I whakaputaina: (2009)
mā: Oppliger, Rolf
I whakaputaina: (2009)
Hacking web apps detecting and preventing web application security problems /
mā: Shema, Mike
I whakaputaina: (2012)
mā: Shema, Mike
I whakaputaina: (2012)
Part-themed issue on internet security
I whakaputaina: (2006)
I whakaputaina: (2006)
Essentials of online payment security and fraud prevention
mā: Montague, David A., 1967-
I whakaputaina: (2010)
mā: Montague, David A., 1967-
I whakaputaina: (2010)
Control and security of E-commerce
mā: Smith, Gordon E. (Gordon Edward)
I whakaputaina: (2004)
mā: Smith, Gordon E. (Gordon Edward)
I whakaputaina: (2004)
Comprehensive approach as 'sine qua non' for critical infrastructure protection /
I whakaputaina: (2015)
I whakaputaina: (2015)
The basics of web hacking tools and techniques to attack the Web /
mā: Pauli, Joshua J.
I whakaputaina: (2013)
mā: Pauli, Joshua J.
I whakaputaina: (2013)
Understanding Voice over IP security
mā: Johnston, Alan B.
I whakaputaina: (2006)
mā: Johnston, Alan B.
I whakaputaina: (2006)
Business continuity planning for data centers and systems a strategic implementation guide /
mā: Bowman, Ronald H., 1960-
I whakaputaina: (2008)
mā: Bowman, Ronald H., 1960-
I whakaputaina: (2008)
Cybersecurity public sector threats and responses /
I whakaputaina: (2012)
I whakaputaina: (2012)
The business blockchain : promise, practice, and application of the next Internet technology /
mā: Mougayar, William
I whakaputaina: (2016)
mā: Mougayar, William
I whakaputaina: (2016)
Z/OS WebSphere and J2EE security handbook
I whakaputaina: (2003)
I whakaputaina: (2003)
Insider threat protecting the enterprise from sabotage, spying, and theft /
mā: Cole, Eric
I whakaputaina: (2006)
mā: Cole, Eric
I whakaputaina: (2006)
Distributed systems security issues, processes, and solutions /
I whakaputaina: (2009)
I whakaputaina: (2009)
Ngā tūemi rite
-
Internet security and firewalls
mā: Preetham, V. V.
I whakaputaina: (2002) -
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
I whakaputaina: (2001) -
Internet security you can afford : using untangle as your internet gateway /
mā: Dawson, Christopher
I whakaputaina: (2015) -
Network and security issues for internet mobile entertainment
I whakaputaina: (2004) -
Special issue on internet security
I whakaputaina: (2002)