×







We sell 100% Genuine & New Books only!

Phishing Cutting The Identity Theft Line at Meripustak

Phishing Cutting The Identity Theft Line by Rachael Lininger , Russell Dean Vines , John Wiley

Books from same Author: Rachael Lininger , Russell Dean Vines

Books from same Publisher: John Wiley

Related Category: Author List / Publisher List


  • Price: ₹ 2588.00/- [ 25.00% off ]

    Seller Price: ₹ 1941.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Rachael Lininger , Russell Dean Vines
    PublisherJohn Wiley
    ISBN9780764584985
    Pages334
    BindingPaperback
    LanguageEnglish
    Publish YearMay 2005

    Description

    John Wiley Phishing Cutting The Identity Theft Line by Rachael Lininger , Russell Dean Vines

    Phishing is the hot new identity theft scam. An unsuspecting victim receives an e-mail that seems to come from a bank or other financial institution, and it contains a link to a Web site where s/he is asked to provide account details. The site looks legitimate, and 3 to 5 per cent of people who receive the e-mail go on to surrender their information - to crooks. One e-mail monitoring organization reported 2.3 billion phishing messages in February 2004 alone. If that werent enough, the crooks have expanded their operations to include malicious code that steals identity information without the computer users knowledge. Thousands of computers are compromised each day, and phishing code is increasingly becoming part of the standard exploits. Written by a phishing security expert at a top financial institution, this unique book helps IT professionals respond to phishing incidents. After describing in detail what goes into phishing expeditions, the author provides step-by-step directions for discouraging attacks and responding to those that have already happened. In "Phishing", Rachael Lininger: offers case studies that reveal the technical ins and outs of impressive phishing attacks; presents a step-by-step model for phishing prevention; explains how intrusion detection systems can help prevent phishers from attaining their goal-identity theft; and, delivers in-depth incident response techniques that can quickly shutdown phishing sites. About the Authors.Introduction.Chapter 1: Phishing for Phun and Profit.Chapter 2: Bait and Switch: Phishing Emails.Chapter 3: False Fronts: Phishing Websites.Chapter 4: Are You Owned? Understanding Phishing Spyware.Chapter 5: Gloom and Doom: You Cant Stop Phishing Completely.Chapter 6: Helping Your Organization Avoid Phishing.Chapter 7: Fighting Back: How Your Organization Can Respond to Attacks.Chapter 8: Avoiding the Hook: Consumer Education.Chapter 9: Help! Im a Phish! Consumer Response.Appendix A: Glossary of Phishing-Related Terms.Appendix B: Useful Websites.Appendix C: Identity Theft Affidavit.Index.



    Book Successfully Added To Your Cart