libcats.org
Главная

Information Security Management Handbook

Обложка книги Information Security Management Handbook

Information Security Management Handbook

,
The book has a particularly good summary of phishing. Explaining the main attack methods used by phishers to trick users into divulging sensitive financial data about themselves.
It also goes into how phishers use compromised computers to inject their messages into the net. The reader should note that in most cases, these computers are not the targets of the bad phishing links inside the messages. So one lesson is that we must expect that phishers will always be able to disseminate messages.
The countermeasures are given. For a far more extensive discussion, check out Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. However, neither book has made the conceptual leap to using Partner Lists and custom tags inside real messages from banks.
Популярные книги за неделю:

Ключ к сверхсознанию

Автор:
Категория: Путь к себе
Размер книги: 309 Kb

Genki 1: An Integrated Course in Elementary Japanese 1

Автор: , Автор: , Автор: , Автор: , Автор:
Размер книги: 172.22 Mb

Contemporary Theatre, Film and Television, Volume 97

Автор:
Размер книги: 3.18 Mb
Только что пользователи скачали эти книги:

Школа игры на блокфлейте

Автор:
Категория: info, teach, color, music
Размер книги: 29.05 Mb

iPhoto '11: The Missing Manual

Автор: , Автор:
Размер книги: 41.06 Mb

Widow's Bargain

Автор:
Категория: fiction
Размер книги: 1.70 Mb

The Red Necklace

Автор:
Категория: fiction
Размер книги: 402 Kb