Malicious bots an inside look into the cyber-criminal underground of the internet

Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise o...

Full description

Bibliographic Details
Main Author: Dunham, Ken (-)
Other Authors: Melnick, Jim
Format: eBook
Language:Inglés
Published: Boca Raton : CRC Press 2008.
Edition:1st edition
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627592306719
Table of Contents:
  • Front cover; Dedication; Contents; Preface; Acknowledgments and Permissions; About the Authors; Chapter 1. Introduction to Bots; Chapter 2. Thr34t Security Krew and the TK Worm; Chapter 3. Demonstration: How a Hacker Launches a Botnet Attack; Chapter 4. Introduction to the Use of Botnets in Criminal Activity; Chapter 5. Botnets and the eCrime Cycle: The iSIGHT Partnets' Approach; Chapter 6. Technical Introduction to Bots; Chapter 7. Mitigation; Chapter 8. Concluding Thoughts; Glossary; Bibliography; Index; Back cover