Free shiping! Use code EGGNOG. Ends December 13 at noon!
Used, New, and Out of Print Books - We Buy and Sell - Powell's Books
Cart |
|  my account  |  wish list  |  help   |  800-878-7323
Hello, | Login
MENU
  • Browse
    • New Arrivals
    • Bestsellers
    • Award Winners
    • Signed Preorders
    • Signed Editions
    • Digital Audio Books
    • Newsletters
    • See All Subjects
  • Used
  • Staff Picks
    • Staff Picks
    • Picks of the Season
    • Staff Top Fives 2018
    • Boox
    • Indiespensable
    • 25 Books From the 21st Century
    • 25 Memoirs to Read Before You Die
    • 25 Global Books to Read Before You Die
    • 25 Women to Read Before You Die
    • 25 Books to Read Before You Die
    • Book Club Subscriptions
  • Gifts + Gift Cards
    • Gift Cards & eGift Cards
    • Powell's Souvenirs
    • Read Rise Resist Gear
    • Journals & Notebooks
    • Games
    • Socks
  • Sell Books
    • Sell Books Online
    • Sell Books in Our Stores
  • Blog
  • Events
  • Find A Store
McAfee Secure

Don't Miss

  • Free Shipping & Guaranteed Holiday Delivery
  • Picks of the Season
  • Great Gifts Under $15 & $25
  • Winter Sale: Buy 2, Get 1 Free
  • Kids' Graphic Novels
  • What I'm Giving
  • Indiespensable #83: The Topeka School
  • BOOX #17: Pokko & the Drum
  • 20% Off Oregon Battle of the Books

Visit Our Stores


Powell's Books: What I'm Giving: Guest Edition (0 comment)
Need some gift-giving inspiration? Take a peek at the books these local authors are giving this year...
Read More»
  • Powell's Staff: Best Fiction of 2019 (1 comment)
  • Keith Mosman: Best Nonfiction of 2019 (0 comment)

{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##

Phishing Exposed

by Lance James
Phishing Exposed

  • Comment on this title
  • Synopses & Reviews

ISBN13: 9781597490306
ISBN10: 159749030X



All Product Details

View Larger ImageView Larger Images
$73.27
New Trade Paperback
Ships in 1 to 3 days
Add to Cart
Add to Wishlist
QtyStore
20Remote Warehouse

Synopses & Reviews

Publisher Comments

If you have ever received a phish, become a victim of a phish, or manage the security of a major e-commerce or financial site, then you need to read this book. The author of this book delivers the unconcealed techniques of phishers including their evolving patterns, and how to gain the upper hand against the ever-accelerating attacks they deploy. Filled with elaborate and unprecedented forensics, Phishing Exposed details techniques that system administrators, law enforcement, and fraud investigators can exercise and learn more about their attacker and their specific attack methods, enabling risk mitigation in many cases before the attack occurs.

Phishers have 4 basic attack methods, and are ever expanding their arsenal of techniques. But underneath, you'll find they still contain fundamental flaws within their attack-- if you look close enough. The author reveals these techniques and dives deep into exploiting the phishers, empowering the defending side to track, detect, prevent and deter future attacks. The first set of chapters introduces you to the art of research and demonstrates the detailed and accurate results that this enduring practice presents. This analysis establishes the existence of multiple distinct phishing groups, and the author delivers a powerful technique to identify groups of phishers, even linking them to certain spamming groups. Presently, there are 36 unique active groups, with 4 main large groups that are encompassing the principal activity and possess the majority of earnings acquired from these illicit endeavors.

After uncovering the properties of phishing: the first phases of attack, the author takes you into the exploration of the moneytransfer scams and the business fronts they create to recruit mules to do their laundry. An exploration of the how-to uncovers the rules mule drivers must employ on mule recruitment and how these rules bind them in their attempts to protect their identity. Also observed is how telephony exploitation is used to remain anonymous and scam transfer companies, such as moneygram and western union, and how evolving future telecommunication attacks may enable phishers to continue their illicit endeavors.

Phishing Exposed links the malware authors to the phishing community, and how the economics of the underground are established, including demonstration of the malware used, with analysis of some undetectable malware including variants of Berbew, mitgleider, A311 Death (haxdoor) and Sasser. The final chapters explore the other activities of this organized criminal enterprise, and discusses the impact of limited legislation and collaboration by domestic and international law enforcement that hinders successful apprehension. The author encourages collaboration, and displays the successes with intelligence and reconnaissance due to collaboration with ISP's, other investigators, law enforcement and financial institutions.

Synopsis

Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry.

Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today.

This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers.

* Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts

* Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic

* Stay one step ahead of the enemy with all the latest information


Table of Contents

1 The art of Research

2 Email Effectiveness

3 Where's The Money

4 Lawful Forensics

5 Malware and XSS 5

6 Telephony Exploitation

7.0 Final Analysis


What Our Readers Are Saying

Be the first to share your thoughts on this title!




Product Details

ISBN:
9781597490306
Binding:
Trade Paperback
Publication date:
10/01/2005
Publisher:
Syngress Publishing
Language:
English
Pages:
395
Height:
1.00IN
Width:
7.00IN
Number of Units:
1
Illustration:
Yes
Copyright Year:
2005
UPC Code:
2801597490308
Foreword:
Joe Stewart
Author:
Lance James
Author:
Joe Stewart
Subject:
Computer security
Subject:
Prevention
Subject:
Identity theft - Prevention

Ships free on qualified orders.
Add to Cart
$73.27
New Trade Paperback
Ships in 1 to 3 days
Add to Wishlist
QtyStore
20Remote Warehouse
Used Book Alert for book Receive an email when this ISBN is available used.
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
  • Twitter
  • Facebook
  • Pinterest
  • Instagram

  • Help
  • Guarantee
  • My Account
  • Careers
  • About Us
  • Security
  • Wish List
  • Partners
  • Contact Us
  • Shipping
  • Newsletters
  • Sitemap
  • © 2019 POWELLS.COM Terms
  • 800-878-7323

{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##