The death of the internet / (Record no. 206037)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 06614cam a2200865Ia 4500 |
001 - CONTROL NUMBER | |
control field | ocn799768467 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20170612141629.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu---unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 120716s2012 nju ob 000 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | EBLCP |
Language of cataloging | eng |
Description conventions | pn |
Transcribing agency | EBLCP |
Modifying agency | DG1 |
-- | YDXCP |
-- | N$T |
-- | CDX |
-- | OCLCO |
-- | COO |
-- | OCLCO |
-- | OCLCQ |
-- | TEFOD |
-- | OCLCF |
-- | DEBSZ |
-- | OCLCO |
-- | OCLCQ |
-- | IEEEE |
-- | TEFOD |
-- | OCLCQ |
-- | DG1 |
019 ## - | |
-- | 805071189 |
-- | 858699726 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781118312551 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1118312554 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781118312537 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1118312538 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 1118062418 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781118062418 |
024 8# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 9786613770028 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000049858911 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | DEBSZ |
System control number | 397235429 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | NZ1 |
System control number | 14695013 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | NZ1 |
System control number | 15340854 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)799768467 |
Canceled/invalid control number | (OCoLC)805071189 |
-- | (OCoLC)858699726 |
037 ## - SOURCE OF ACQUISITION | |
Stock number | 377002 |
Source of stock number/acquisition | MIL |
037 ## - SOURCE OF ACQUISITION | |
Stock number | 34298BC4-4E6D-4D1E-8B17-7DBF7E8D0BA7 |
Source of stock number/acquisition | OverDrive, Inc. |
Note | http://www.overdrive.com |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5105.875.I57 |
Item number | .J34 2012 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 060040 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 043050 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 053000 |
Source | bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 22 |
084 ## - OTHER CLASSIFICATION NUMBER | |
Classification number | COM053000 |
Number source | bisacsh |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | MAIN |
245 04 - TITLE STATEMENT | |
Title | The death of the internet / |
Statement of responsibility, etc. | edited by Markus Jakobsson. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | Hoboken : |
Name of publisher, distributor, etc. | John Wiley & Sons, |
Date of publication, distribution, etc. | ©2012. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (387 pages) |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | THE DEATH OF THE INTERNET; Contents; Foreword; Preface; Is the Title of this Book a Joke?; Acknowledgments; Contributors; Part I The Problem; 1 What Could Kill the Internet? And so What?; 2 It is About People; 2.1 Human and Social Issues; 2.1.1 Nigerian Scams; 2.1.2 Password Reuse; 2.1.3 Phishing; 2.2 Who are the Criminals?; 2.2.1 Who are they?; 2.2.2 Where are they?; 2.2.3 Deep-Dive: Taking a Look at Ex-Soviet Hackers; 2.2.4 Let's try to Find Parallels in the World we Live in; 2.2.5 Crime and Punishment?; 3 How Criminals Profit; 3.1 Online Advertising Fraud; 3.1.1 Advertising on the Internet. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 3.1.1.1 Ad serving architecture3.1.1.2 Targeted advertising; 3.1.1.3 Revenue models; 3.1.2 Exploits of Online Advertising Systems; 3.1.2.1 Adversary; 3.1.2.2 Ad Fraud; 3.1.3 Click Fraud; 3.1.3.1 Case study: advertisers scammed by porn sites; 3.1.3.2 Countermeasures to fight click fraud; 3.1.4 Malvertising: Spreading Malware via Ads; 3.1.4.1 Countermeasures to fight malvertising; 3.1.5 Inflight Modification of Ad Traffic; 3.1.5.1 Countermeasures to fight inflight modification of ad traffic; 3.1.6 Adware: Unsolicited Software Ads; 3.1.6.1 Countermeasures to fight adware; 3.1.7 Conclusion. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 3.2 Toeing the Line: Legal but Deceptive Service Offers3.2.1 How Does it Work?; 3.2.2 What do they Earn?; 3.3 Phishing and Some Related Attacks; 3.3.1 The Problem is the User; 3.3.2 Phishing; 3.3.3 Man-in-the-Middle; 3.3.4 Man-in-the-Browser; 3.3.5 New Attack: Man-in-the-Screen; 3.4 Malware: Current Outlook; 3.4.1 Malware Evolution; 3.4.1.1 Malware categories; 3.4.1.2 Malware example; 3.4.1.3 Polymorphic malware; 3.4.2 Malware Supply and Demand; 3.4.2.1 The malware industry; 3.4.2.2 Malware supply chain; 3.5 Monetization; 3.5.1 There is Money Everywhere; 4 How Things Work and Fail. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 4.1 Online Advertising: With Secret Security4.1.1 What is a Click?; 4.1.2 How Secret Filters are Evaluated; 4.1.2.1 Third-party click scoring; 4.1.2.2 Ad network check: new filter, old clicks; 4.1.2.3 Ad network check: old filter, new clicks; 4.1.3 What do Fraudsters Know?; 4.2 Web Security Remediation Efforts; 4.2.1 Introduction; 4.2.2 The Multitude of Web Browser Security Mechanisms; 4.2.2.1 Web browser-based built-in security mechanisms; 4.2.2.2 Selectively invocable browser-based security mechanisms; 4.2.2.3 Advanced browser-based web security mechanisms; 4.2.3 Where do we go from Here? |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 4.3 Content-Sniffing XSS Attacks: XSS with Non-HTML Content4.3.1 Introduction; 4.3.2 Content-Sniffing XSS Attacks; 4.3.2.1 Content-sniffing; 4.3.2.2 A detailed view of content-sniffing XSS attacks; 4.3.2.3 Why do mismatches happen?; 4.3.2.4 Finding content-sniffing XSS attacks; 4.3.2.5 Example 1: Under the hood of the HotCRP attack; 4.3.2.6 Example 2: An attack on wikipedia; 4.3.3 Defenses; 4.3.3.1 Server-side defenses; 4.3.3.2 Secure content-sniffing; 4.3.3.3 Adoption; 4.3.4 Conclusion; 4.4 Our Internet Infrastructure at Risk; 4.4.1 Introduction; 4.4.2 The Political Structure. |
500 ## - GENERAL NOTE | |
General note | 4.4.3 The Domain. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and governments. This book will examine these and related topics, such as smart phone based web security. This book describes the basic threats to the Internet (loss of trust, loss of advertising revenue, l. |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references. |
588 0# - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Print version record. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Internet |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Electronic commerce |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer crimes. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Electrical engineering. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Engineering. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer science. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | COMPUTERS |
General subdivision | Internet |
-- | Security. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | COMPUTERS |
General subdivision | Networking |
-- | Security. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | COMPUTERS |
General subdivision | Security |
-- | General. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer crimes. |
Source of heading or term | fast |
Authority record control number | (OCoLC)fst00872063 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data protection. |
Source of heading or term | fast |
Authority record control number | (OCoLC)fst00887958 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Electronic commerce |
General subdivision | Security measures. |
Source of heading or term | fast |
Authority record control number | (OCoLC)fst00906919 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Internet |
General subdivision | Security measures. |
Source of heading or term | fast |
Authority record control number | (OCoLC)fst01751426 |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Jakobsson, Markus. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
International Standard Book Number | 9786613770028 |
Record control number | (DLC) 2011047198 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://onlinelibrary.wiley.com/book/10.1002/9781118312551 |
Public note | Wiley Online Library |
938 ## - | |
-- | Coutts Information Services |
-- | COUT |
-- | 22977842 |
938 ## - | |
-- | EBL - Ebook Library |
-- | EBLB |
-- | EBL848529 |
938 ## - | |
-- | EBSCOhost |
-- | EBSC |
-- | 467057 |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 9571129 |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 7657566 |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 12671977 |
994 ## - | |
-- | 92 |
-- | DG1 |
No items available.