Seven deadliest social network attacks / Carl Timm, Richard Perez ; technical editor, Adam Ely.
Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of th...
Saved in:
Online Access: |
Full Text (via Skillsoft) |
---|---|
Main Author: | |
Other Authors: | , |
Format: | Electronic eBook |
Language: | English |
Published: |
Burlington, MA :
Syngress/Elsevier,
©2010.
|
Series: | Syngress seven deadliest attacks series.
|
Subjects: |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | b12282811 | ||
005 | 20231215081412.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 100920s2010 maua ob 001 0 eng d | ||
015 | |a GBB002363 |2 bnb | ||
016 | 7 | |a 015455624 |2 Uk | |
019 | |a 613962608 |a 793286799 |a 1058117573 |a 1064033988 |a 1102534154 |a 1103266212 |a 1129358950 |a 1152977469 |a 1192329230 |a 1240514947 | ||
020 | |a 9781597495462 |q (electronic bk.) | ||
020 | |a 1597495468 |q (electronic bk.) | ||
020 | |z 9781597495455 | ||
020 | |z 159749545X | ||
029 | 1 | |a AU@ |b 000045963939 | |
029 | 1 | |a AU@ |b 000057019135 | |
029 | 1 | |a CHNEW |b 001009853 | |
029 | 1 | |a DEBBG |b BV039827072 | |
029 | 1 | |a DEBBG |b BV040902075 | |
029 | 1 | |a DEBBG |b BV042300689 | |
029 | 1 | |a DEBSZ |b 372727301 | |
029 | 1 | |a DEBSZ |b 37829525X | |
029 | 1 | |a DEBSZ |b 381381404 | |
029 | 1 | |a DEBSZ |b 39911923X | |
029 | 1 | |a DEBSZ |b 430881231 | |
029 | 1 | |a GBVCP |b 785360646 | |
029 | 1 | |a NZ1 |b 13448978 | |
029 | 1 | |a NZ1 |b 15187749 | |
029 | 1 | |a DKDLA |b 820120-katalog:9910110229905765 | |
035 | |a (OCoLC)sks664572512 | ||
035 | |a (OCoLC)664572512 |z (OCoLC)613962608 |z (OCoLC)793286799 |z (OCoLC)1058117573 |z (OCoLC)1064033988 |z (OCoLC)1102534154 |z (OCoLC)1103266212 |z (OCoLC)1129358950 |z (OCoLC)1152977469 |z (OCoLC)1192329230 |z (OCoLC)1240514947 | ||
037 | |a sks37231 | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d EBLCP |d OCLCQ |d SHH |d OPELS |d CDX |d E7B |d OCLCQ |d UMI |d COO |d OCLCQ |d DEBSZ |d OCLCQ |d VLB |d OCLCA |d TEFOD |d OCLCQ |d OCLCO |d TEFOD |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d LIV |d MERUC |d OCLCQ |d OCLCA |d OCLCF |d D6H |d CEF |d AU@ |d OCLCQ |d WYU |d AUD |d LEAUB |d OL$ |d VT2 |d OCLCQ |d UHL |d OCLCQ |d OCLCO |d LUU |d OCLCQ |d INARC |d OCLCO |d OCLCL | ||
049 | |a GWRE | ||
050 | 4 | |a TK5105.88817 |b .T56 2010eb | |
100 | 1 | |a Timm, Carl. | |
245 | 1 | 0 | |a Seven deadliest social network attacks / |c Carl Timm, Richard Perez ; technical editor, Adam Ely. |
260 | |a Burlington, MA : |b Syngress/Elsevier, |c ©2010. | ||
300 | |a 1 online resource (xxi, 133 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Syngress seven deadliest attacks series | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Social networking infrastructure attacks -- Malware attacks -- Phishing attacks -- Evil twin attacks -- Identity theft -- Cyberbullying -- Physical threats. | |
520 | |a Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastructure Attacks Malware Attacks Phishing Attacks Evil Twin Attacks Identity Theft Cyber Bullying Physical Threats Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Web 2.0 |x Security measures. | |
650 | 0 | |a Online social networks |x Security measures. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Malware (Computer software) |x Prevention. | |
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 7 | |a Computer crimes |x Prevention |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
700 | 1 | |a Perez, Richard, |d 1969 October 17- |1 https://id.oclc.org/worldcat/entity/E39PCjwV34TfMG8Dyc6mH6MkjC | |
700 | 1 | |a Ely, Adam. | |
776 | 0 | 8 | |i Print version: |a Timm, Carl. |t Seven deadliest social network attacks. |d Burlington, MA : Syngress/Elsevier, ©2010 |z 9781597495455 |w (DLC) 2010014463 |w (OCoLC)612958560 |
830 | 0 | |a Syngress seven deadliest attacks series. | |
856 | 4 | 0 | |u https://ucblibraries.skillport.com/skillportfe/main.action?assetid=37231 |z Full Text (via Skillsoft) |
915 | |a - | ||
956 | |a Skillsoft ITPro | ||
956 | |b Skillsoft ITPro Skillport Collection | ||
994 | |a 92 |b COD | ||
998 | |b Subsequent record output | ||
999 | f | f | |i 1338aeb3-e620-5106-9954-228f15bf9135 |s 66639f87-69f2-5b28-bc63-b4fe313ac3d4 |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e TK5105.88817 .T56 2010eb |h Library of Congress classification |i web |n 1 |