The death of the Internet
"Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In additi...
Сохранить в:
Соавтор: | ebrary, Inc |
---|---|
Другие авторы: | Jakobsson, Markus |
Формат: | Электронный ресурс eКнига |
Язык: | английский |
Опубликовано: |
Hoboken, N.J. :
IEEE Press, Computer Society, Wiley, Higher Education Press,
2012.
|
Предметы: | |
Online-ссылка: | An electronic book accessible through the World Wide Web; click to view |
Метки: |
Добавить метку
Нет меток, Требуется 1-ая метка записи!
|
Схожие документы
Internet security and firewalls
по: Preetham, V. V.
Опубликовано: (2002)
по: Preetham, V. V.
Опубликовано: (2002)
Internet security you can afford : using untangle as your internet gateway /
по: Dawson, Christopher
Опубликовано: (2015)
по: Dawson, Christopher
Опубликовано: (2015)
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Опубликовано: (2001)
Опубликовано: (2001)
Special issue on internet security
Опубликовано: (2002)
Опубликовано: (2002)
Network and security issues for internet mobile entertainment
Опубликовано: (2004)
Опубликовано: (2004)
Privacy online : OECD guidance on policy and practice.
Опубликовано: (2003)
Опубликовано: (2003)
CMS security handbook the comprehensive guide for WordPress, Joomla!, Drupal, and Plone /
по: Canavan, Tom
Опубликовано: (2011)
по: Canavan, Tom
Опубликовано: (2011)
Web 2.0 security defending Ajax, RIA, and SOA /
по: Shah, Shreeraj
Опубликовано: (2008)
по: Shah, Shreeraj
Опубликовано: (2008)
Cyber conflict competing national perspectives /
по: Ventre, Daniel
Опубликовано: (2012)
по: Ventre, Daniel
Опубликовано: (2012)
Advances in cyber security : technology, operations, and experiences /
Опубликовано: (2013)
Опубликовано: (2013)
Designing network security : a practical guide to creating a secure network infrastructure /
по: Kaeo, Merike
Опубликовано: (2004)
по: Kaeo, Merike
Опубликовано: (2004)
WordPress 3 ultimate security protect your WordPress site and its network /
по: Connelly, Olly
Опубликовано: (2011)
по: Connelly, Olly
Опубликовано: (2011)
Designing and building enterprise DMZs
по: Flynn, Hal
Опубликовано: (2006)
по: Flynn, Hal
Опубликовано: (2006)
Cybersecurity : managing systems, conducting testing, and investigating intrusions /
по: Mowbray, Thomas J.
Опубликовано: (2014)
по: Mowbray, Thomas J.
Опубликовано: (2014)
IoT security issues /
по: Gilchrist, Alasdair
Опубликовано: (2017)
по: Gilchrist, Alasdair
Опубликовано: (2017)
Google Hacking for Penetration Testers
по: Long, Johnny
Опубликовано: (2005)
по: Long, Johnny
Опубликовано: (2005)
The web application hacker's handbook finding and exploiting security flaws /
по: Stuttard, Dafydd
Опубликовано: (2011)
по: Stuttard, Dafydd
Опубликовано: (2011)
The dark sides of the Internet : on cyber threats and information warfare /
по: Heickerö, Roland
Опубликовано: (2013)
по: Heickerö, Roland
Опубликовано: (2013)
Android forensics investigation, analysis, and mobile security for Google Android /
по: Hoog, Andrew
Опубликовано: (2011)
по: Hoog, Andrew
Опубликовано: (2011)
The secure online business handbook a practical guide to risk management and business continuity /
Опубликовано: (2006)
Опубликовано: (2006)
Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise /
по: Woody, Aaron
Опубликовано: (2013)
по: Woody, Aaron
Опубликовано: (2013)
The science of cybersecurity and a roadmap to research
Опубликовано: (2011)
Опубликовано: (2011)
The future of the Internet and how to stop it
по: Zittrain, Jonathan (Jonathan L.), 1969-
Опубликовано: (2008)
по: Zittrain, Jonathan (Jonathan L.), 1969-
Опубликовано: (2008)
Towards the future internet emerging trends from European research /
Опубликовано: (2010)
Опубликовано: (2010)
Use of risk analysis in computer-aided persuasion
Опубликовано: (2011)
Опубликовано: (2011)
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice /
по: Winterfeld, Steve
Опубликовано: (2013)
по: Winterfeld, Steve
Опубликовано: (2013)
SSL and TLS theory and practice /
по: Oppliger, Rolf
Опубликовано: (2009)
по: Oppliger, Rolf
Опубликовано: (2009)
Hacking web apps detecting and preventing web application security problems /
по: Shema, Mike
Опубликовано: (2012)
по: Shema, Mike
Опубликовано: (2012)
Part-themed issue on internet security
Опубликовано: (2006)
Опубликовано: (2006)
Essentials of online payment security and fraud prevention
по: Montague, David A., 1967-
Опубликовано: (2010)
по: Montague, David A., 1967-
Опубликовано: (2010)
Control and security of E-commerce
по: Smith, Gordon E. (Gordon Edward)
Опубликовано: (2004)
по: Smith, Gordon E. (Gordon Edward)
Опубликовано: (2004)
Comprehensive approach as 'sine qua non' for critical infrastructure protection /
Опубликовано: (2015)
Опубликовано: (2015)
The basics of web hacking tools and techniques to attack the Web /
по: Pauli, Joshua J.
Опубликовано: (2013)
по: Pauli, Joshua J.
Опубликовано: (2013)
Understanding Voice over IP security
по: Johnston, Alan B.
Опубликовано: (2006)
по: Johnston, Alan B.
Опубликовано: (2006)
Business continuity planning for data centers and systems a strategic implementation guide /
по: Bowman, Ronald H., 1960-
Опубликовано: (2008)
по: Bowman, Ronald H., 1960-
Опубликовано: (2008)
Cybersecurity public sector threats and responses /
Опубликовано: (2012)
Опубликовано: (2012)
The business blockchain : promise, practice, and application of the next Internet technology /
по: Mougayar, William
Опубликовано: (2016)
по: Mougayar, William
Опубликовано: (2016)
Z/OS WebSphere and J2EE security handbook
Опубликовано: (2003)
Опубликовано: (2003)
Insider threat protecting the enterprise from sabotage, spying, and theft /
по: Cole, Eric
Опубликовано: (2006)
по: Cole, Eric
Опубликовано: (2006)
Distributed systems security issues, processes, and solutions /
Опубликовано: (2009)
Опубликовано: (2009)
Схожие документы
-
Internet security and firewalls
по: Preetham, V. V.
Опубликовано: (2002) -
Internet security you can afford : using untangle as your internet gateway /
по: Dawson, Christopher
Опубликовано: (2015) -
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Опубликовано: (2001) -
Special issue on internet security
Опубликовано: (2002) -
Network and security issues for internet mobile entertainment
Опубликовано: (2004)