The death of the Internet
"Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In additi...
Na minha lista:
Autor Corporativo: | ebrary, Inc |
---|---|
Outros Autores: | Jakobsson, Markus |
Formato: | Recurso Eletrônico livro eletrônico |
Idioma: | inglês |
Publicado em: |
Hoboken, N.J. :
IEEE Press, Computer Society, Wiley, Higher Education Press,
2012.
|
Assuntos: | |
Acesso em linha: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Registros relacionados
Internet security and firewalls
por: Preetham, V. V.
Publicado em: (2002)
por: Preetham, V. V.
Publicado em: (2002)
Internet security you can afford : using untangle as your internet gateway /
por: Dawson, Christopher
Publicado em: (2015)
por: Dawson, Christopher
Publicado em: (2015)
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Publicado em: (2001)
Publicado em: (2001)
Network and security issues for internet mobile entertainment
Publicado em: (2004)
Publicado em: (2004)
Special issue on internet security
Publicado em: (2002)
Publicado em: (2002)
Privacy online : OECD guidance on policy and practice.
Publicado em: (2003)
Publicado em: (2003)
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone /
por: Canavan, Tom
Publicado em: (2011)
por: Canavan, Tom
Publicado em: (2011)
Web 2.0 security defending Ajax, RIA, and SOA /
por: Shah, Shreeraj
Publicado em: (2008)
por: Shah, Shreeraj
Publicado em: (2008)
WordPress 3 ultimate security protect your WordPress site and its network /
por: Connelly, Olly
Publicado em: (2011)
por: Connelly, Olly
Publicado em: (2011)
Cyber conflict competing national perspectives /
por: Ventre, Daniel
Publicado em: (2012)
por: Ventre, Daniel
Publicado em: (2012)
Advances in cyber security : technology, operations, and experiences /
Publicado em: (2013)
Publicado em: (2013)
Designing network security : a practical guide to creating a secure network infrastructure /
por: Kaeo, Merike
Publicado em: (2004)
por: Kaeo, Merike
Publicado em: (2004)
Designing and building enterprise DMZs
por: Flynn, Hal
Publicado em: (2006)
por: Flynn, Hal
Publicado em: (2006)
Cybersecurity : managing systems, conducting testing, and investigating intrusions /
por: Mowbray, Thomas J.
Publicado em: (2014)
por: Mowbray, Thomas J.
Publicado em: (2014)
IoT security issues /
por: Gilchrist, Alasdair
Publicado em: (2017)
por: Gilchrist, Alasdair
Publicado em: (2017)
Google Hacking for Penetration Testers
por: Long, Johnny
Publicado em: (2005)
por: Long, Johnny
Publicado em: (2005)
The web application hacker's handbook finding and exploiting security flaws /
por: Stuttard, Dafydd
Publicado em: (2011)
por: Stuttard, Dafydd
Publicado em: (2011)
Android forensics investigation, analysis, and mobile security for Google Android /
por: Hoog, Andrew
Publicado em: (2011)
por: Hoog, Andrew
Publicado em: (2011)
The dark sides of the Internet : on cyber threats and information warfare /
por: Heickerö, Roland
Publicado em: (2013)
por: Heickerö, Roland
Publicado em: (2013)
The secure online business handbook a practical guide to risk management and business continuity /
Publicado em: (2006)
Publicado em: (2006)
Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise /
por: Woody, Aaron
Publicado em: (2013)
por: Woody, Aaron
Publicado em: (2013)
The science of cybersecurity and a roadmap to research
Publicado em: (2011)
Publicado em: (2011)
The future of the Internet and how to stop it
por: Zittrain, Jonathan (Jonathan L.), 1969-
Publicado em: (2008)
por: Zittrain, Jonathan (Jonathan L.), 1969-
Publicado em: (2008)
Use of risk analysis in computer-aided persuasion
Publicado em: (2011)
Publicado em: (2011)
Towards the future internet emerging trends from European research /
Publicado em: (2010)
Publicado em: (2010)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
por: Winterfeld, Steve
Publicado em: (2013)
por: Winterfeld, Steve
Publicado em: (2013)
SSL and TLS theory and practice /
por: Oppliger, Rolf
Publicado em: (2009)
por: Oppliger, Rolf
Publicado em: (2009)
Hacking web apps detecting and preventing web application security problems /
por: Shema, Mike
Publicado em: (2012)
por: Shema, Mike
Publicado em: (2012)
Part-themed issue on internet security
Publicado em: (2006)
Publicado em: (2006)
Essentials of online payment security and fraud prevention
por: Montague, David A., 1967-
Publicado em: (2010)
por: Montague, David A., 1967-
Publicado em: (2010)
Comprehensive approach as 'sine qua non' for critical infrastructure protection /
Publicado em: (2015)
Publicado em: (2015)
Control and security of E-commerce
por: Smith, Gordon E. (Gordon Edward)
Publicado em: (2004)
por: Smith, Gordon E. (Gordon Edward)
Publicado em: (2004)
The basics of web hacking tools and techniques to attack the Web /
por: Pauli, Joshua J.
Publicado em: (2013)
por: Pauli, Joshua J.
Publicado em: (2013)
Understanding Voice over IP security
por: Johnston, Alan B.
Publicado em: (2006)
por: Johnston, Alan B.
Publicado em: (2006)
Business continuity planning for data centers and systems a strategic implementation guide /
por: Bowman, Ronald H., 1960-
Publicado em: (2008)
por: Bowman, Ronald H., 1960-
Publicado em: (2008)
Cybersecurity public sector threats and responses /
Publicado em: (2012)
Publicado em: (2012)
The business blockchain : promise, practice, and application of the next Internet technology /
por: Mougayar, William
Publicado em: (2016)
por: Mougayar, William
Publicado em: (2016)
Z/OS WebSphere and J2EE security handbook
Publicado em: (2003)
Publicado em: (2003)
Insider threat protecting the enterprise from sabotage, spying, and theft /
por: Cole, Eric
Publicado em: (2006)
por: Cole, Eric
Publicado em: (2006)
Distributed systems security issues, processes, and solutions /
Publicado em: (2009)
Publicado em: (2009)
Registros relacionados
-
Internet security and firewalls
por: Preetham, V. V.
Publicado em: (2002) -
Internet security you can afford : using untangle as your internet gateway /
por: Dawson, Christopher
Publicado em: (2015) -
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Publicado em: (2001) -
Network and security issues for internet mobile entertainment
Publicado em: (2004) -
Special issue on internet security
Publicado em: (2002)