Malicious bots an inside look into the cyber-criminal underground of the internet

Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise o...

Descripción completa

Detalles Bibliográficos
Autor principal: Dunham, Ken (-)
Otros Autores: Melnick, Jim
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boca Raton : CRC Press 2008.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627592306719
Tabla de Contenidos:
  • Front cover; Dedication; Contents; Preface; Acknowledgments and Permissions; About the Authors; Chapter 1. Introduction to Bots; Chapter 2. Thr34t Security Krew and the TK Worm; Chapter 3. Demonstration: How a Hacker Launches a Botnet Attack; Chapter 4. Introduction to the Use of Botnets in Criminal Activity; Chapter 5. Botnets and the eCrime Cycle: The iSIGHT Partnets' Approach; Chapter 6. Technical Introduction to Bots; Chapter 7. Mitigation; Chapter 8. Concluding Thoughts; Glossary; Bibliography; Index; Back cover