购物车中还没有商品,赶紧选购吧!
ISBN:
The Death of the Internet
商品价格
降价通知
定价
手机购买
商品二维码
领 券
配送
上海市
数量
库存   个

推荐商品

  • 商品详情
手机购买
商品二维码
加入购物车
价格:
数量:
库存   个

商品详情

商品名称:The Death of the Internet
物料号 :30117-00
重量:0.000千克
ISBN:9787040301175
出版社:高等教育出版社
出版年月:2012-10
作者:Markus Jakobsson
定价:79.00
页码:400
装帧:精装
版次:1
字数:660
开本:16开
套装书:否

一个大范围的网络攻击会严重破坏社会安定或扰乱公共秩序,将导致政府、金融、通信、媒体、电网等的瘫痪,造成严重损失。《信息安全系列:互联网死亡(英文版)》介绍日益增长的来自于各方面针对互联网的威胁,并提供在桌面平台和移动平台上如何打击这些攻击的深入的指导。


《信息安全系列:互联网死亡(英文版)》由安全领域的全能专家任主编,作者均来自于工业界和学术界的专家,他们对保障互联网的整体安全提出了独特的和跨学科的解决途径和方法。它超越了计算机科学,探索了社会和心理学因素,讨论了政治上的攻击动机以及人为错误和犯罪倾向,清楚地为管理人员和决策者解释了互联网安全的一般概念,为工程技术人员以安全的意识进行有效地开发设计提供详细的指南。

Front Matter
Part I The Problem
  Chapter 1 What Could Kill the Internet? And so What?
  Chapter 2 It is About People
   2.1 Human and Social Issues——arkus Jakobsson
   2.2 Who are the Criminals? —— Igor Bulavko
  Chapter 3 How Criminals Profit
   3.1 Online Advertising Fraud——Nevena Vratonjic, Mohammad Hossein Manshaei, and Jean-Pierre Hubaux
   3.2 Toeing the Line: Legal but Deceptive Service Offers ——Markus Jakobsson and Ruilin Zhu
   3.3 Phishing and Some Related Attacks—— Markus Jakobsson and William Leddy
   3.4 Malware: Current Outlook——Members of the BITS Security Working Group and staff leads Greg Rattray nd Andrew Kennedy
   3.5 Monetization——Markus Jakobsson
  Chapter 4 How ThingsWork and Fail
   4.1 Online Advertising: With Secret Security—— Markus Jakobsson
   4.2 Web Security Remediation Efforts——Jeff Hodges and Andy Steingruebl
   4.3 Content-Sniffing XSS Attacks: XSS with Non-HTML Content——Juan Caballero, Adam Barth, and Dawn Song
   4.4 Our Internet Infrastructure at Risk——Garth Bruen
   4.5 Social Spam——Dimitar Nikolov and Filippo Menczer
   4.6 Understanding CAPTCHAs and Their Weaknesses——Elie Bursztein
   4.7 Security Questions——Ariel Rabkin
   4.8 Folk Models of Home Computer Security——Rick Wash and Emilee Rader
   4.9 Detecting and Defeating Interception Attacks Against SSL——Christopher Soghoian and Sid Stamm
  Chapter 5 The Mobile Problem
   5.1 Phishing on Mobile Devices——Adrienne Porter Felt and David Wagner
   5.2 Why Mobile Malware will Explode——Markus Jakobsson and Mark Grandcolas
   5.3 Tapjacking: Stealing Clicks on Mobile Devices——Gustav Rydstedt, Baptiste Gourdin, Elie Bursztein, and Dan Boneh
  Chapter 6 The Internet and the PhysicalWorld
   6.1 Malware-Enabled Wireless Tracking Networks——Nathaniel Husted and Steven Myers
   6.2 Social Networking Leaks——Mayank Dhiman and Markus Jakobsson
   6.3 Abuse of Social Media and Political Manipulation——Bruno Gonc¸alves, Michael Conover, and Filippo Menczer
Part II Thinking About Solutions
  Chapter 7 Solutions to the Problem
   7.1 When and How to Authenticate——Richard Chow, Elaine Shi, Markus Jakobsson, Philippe Golle, Ryusuke Masuoka,Jesus Molina, Yuan Niu, and Jeff Song
   7.2 Fastwords: Adapting Passwords to Constrained Keyboards——Markus Jakobsson and Ruj Akavipat
   7.3 Deriving PINs from Passwords——Markus Jakobsson and Debin Liu
   7.4 Visual Preference Authentication——Yuan Niu, Markus Jakobsson, Gustav Rydstedt, and Dahn Tamir
   7.5 The Deadly Sins of Security User Interfaces——Nathan Good
   7.6 SpoofKiller—Let’s Kiss Spoofing Goodbye!——Markus Jakobsson and William Leddy
   7.7 Device Identification and Intelligence——Ori Eisen
   7.8 How can we Determine if a Device is Infected or not?——Aur´elien Francillon, Markus Jakobsson, and Adrian Perrig
  Chapter 8 The Future
   8.1 Security Needs the Best User Experience Hampus Jakobsson
   8.2 Fraud and the Future——Markus Jakobsson
References
Index

对比栏

1

您还可以继续添加

2

您还可以继续添加

3

您还可以继续添加

4

您还可以继续添加