Search Books
Foundations of Semantic Web… Networking Systems Design a…

Cyber Fraud: Tactics, Techniques and Procedures

Author Howard, Rick
Publisher CRC Press
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
130.00 180.00 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $34.73

✓ Only 1 left in stock - order soon.

Share:
Book Details
Author(s)Howard, Rick
PublisherCRC Press
ISBN / ASIN1420091271
ISBN-139781420091274
AvailabilityOnly 1 left in stock - order soon.
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. Combining the best of investigative journalism and technical analysis, Cyber Fraud: Tactics, Techniques, and Procedures documents changes in the culture of cyber criminals and explores the innovations that are the result of those changes. The book uses the term Botnet as a metaphor for the evolving changes represented by this underground economy.

Copiously illustrated, this engaging and engrossing book explores the state of threats present in the cyber fraud underground. It discusses phishing and pharming, trojans and toolkits, direct threats, pump-and-dump scams, and other fraud-related activities of the booming cyber-underground economy. By examining the geopolitical and socio-economic foundations of a cyber threat landscape, the book specifically examines telecommunications infrastructure development, patterns and trends of internet adoption and use, profiles of specific malicious actors, threat types, and trends in these areas.

This eye-opening work includes a variety of case studies ? including the cyber threat landscape in Russia and Brazil. An in-depth discussion is provided on the Russian Business Network’s (RBN) role in global cyber crime as well as new evidence on how these criminals steal, package, buy, sell, and profit from the personal financial information of consumers. Armed with this invaluable information, organizations and individuals will be better able to secure their systems and develop countermeasures to disrupt underground fraud.

The Good Web Site Guide 2006: The Completely Revised, …
View
The Pentium Microprocessor
View
Advanced Intel Microprocessors: 80286, 80386, And 80486
View
Differential Equations: Matrices and Models
View
Digital Experiments: Emphasizing Troubleshooting (Merr…
View
Data Structures for Computer Information Systems
View
The Little LISPer, Third Edition
View
Inside Networks
View
Computer Graphics Using Open GL (2nd Edition)
View