-
1Publicado 2008Tabla de Contenidos: “…Overview of crimeware -- A taxonomy of coding errors -- Crimeware and peer-to-peer networks -- Crimeware in small devices -- Crimeware in firmware -- Crimeware in the browser -- Bot networks -- Rootkits -- Virtual worlds and fraud -- Cybercrime and politics -- Online advertising fraud -- Crimeware business models -- The educational aspect of security -- Surreptitious code and the law -- Crimeware and trusted computing -- Technical defense techniques -- The future of crimeware…”
Libro electrónico -
2por Loewengart, VictoriaTabla de Contenidos: “…Cover; Title; Copyright; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: Background; Chapter 2: Crimeware Products; "Zero Day" exploit toolkits; "Zeus"; "SpyEye"; "Darkness" DDoS botnet tool; Chapter 3: Unintentional Crimeware; SkyGrabber; Passware Kit; Maltego; Chapter 4: The Present and The Future; Chapter 5: Fighting Back; How to protect yourself from botnet infections; Active defense; Conclusion; Authoritative Sources Of Information; Bibliography; ITG Resources…”
Publicado 2012
Libro electrónico -
3Publicado 2015Tabla de Contenidos: “…SSL EncryptionAdvanced Persistent Threat (APT); Cyber Espionage; Malware and Trojans; Malware Communications; Adware, Crimeware, and Ransomware; Reverse Engineering; Malware Analysis; Memory Attacks and Analysis; Digital Forensics and Incident Response; Penetration Testing Tools; SCADA; Mobile Phone Attacks; Government Surveillance; 3D Printers; Maltego; ROT13; Wickr; Pastebin; Women in Technology; Pirate Party; magicJack; Firewalls; Avatar; Chaos Communication Congress/Chaos Computer Camp; Hacker Spaces; Hacker Hostel; German International ID; Snopes; Wikileaks; DEFCON; BruCON; 44Con; OPSEC…”
Libro electrónico -
4Publicado 2012Tabla de Contenidos: “…-- How's Your Operational Security? -- Crimeware/Analysis Detection Systems -- What Happened on Your Box? …”
Libro electrónico