Seven deadliest social network attacks / Carl Timm, Richard Perez ; technical editor, Adam Ely.

Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of th...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Skillsoft)
Main Author: Timm, Carl
Other Authors: Perez, Richard, 1969 October 17-, Ely, Adam
Format: Electronic eBook
Language:English
Published: Burlington, MA : Syngress/Elsevier, ©2010.
Series:Syngress seven deadliest attacks series.
Subjects:

MARC

LEADER 00000cam a2200000 a 4500
001 b12282811
005 20231215081412.0
006 m o d
007 cr |||||||||||
008 100920s2010 maua ob 001 0 eng d
015 |a GBB002363  |2 bnb 
016 7 |a 015455624  |2 Uk 
019 |a 613962608  |a 793286799  |a 1058117573  |a 1064033988  |a 1102534154  |a 1103266212  |a 1129358950  |a 1152977469  |a 1192329230  |a 1240514947 
020 |a 9781597495462  |q (electronic bk.) 
020 |a 1597495468  |q (electronic bk.) 
020 |z 9781597495455 
020 |z 159749545X 
029 1 |a AU@  |b 000045963939 
029 1 |a AU@  |b 000057019135 
029 1 |a CHNEW  |b 001009853 
029 1 |a DEBBG  |b BV039827072 
029 1 |a DEBBG  |b BV040902075 
029 1 |a DEBBG  |b BV042300689 
029 1 |a DEBSZ  |b 372727301 
029 1 |a DEBSZ  |b 37829525X 
029 1 |a DEBSZ  |b 381381404 
029 1 |a DEBSZ  |b 39911923X 
029 1 |a DEBSZ  |b 430881231 
029 1 |a GBVCP  |b 785360646 
029 1 |a NZ1  |b 13448978 
029 1 |a NZ1  |b 15187749 
029 1 |a DKDLA  |b 820120-katalog:9910110229905765 
035 |a (OCoLC)sks664572512 
035 |a (OCoLC)664572512  |z (OCoLC)613962608  |z (OCoLC)793286799  |z (OCoLC)1058117573  |z (OCoLC)1064033988  |z (OCoLC)1102534154  |z (OCoLC)1103266212  |z (OCoLC)1129358950  |z (OCoLC)1152977469  |z (OCoLC)1192329230  |z (OCoLC)1240514947 
037 |a sks37231 
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d EBLCP  |d OCLCQ  |d SHH  |d OPELS  |d CDX  |d E7B  |d OCLCQ  |d UMI  |d COO  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d VLB  |d OCLCA  |d TEFOD  |d OCLCQ  |d OCLCO  |d TEFOD  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d LIV  |d MERUC  |d OCLCQ  |d OCLCA  |d OCLCF  |d D6H  |d CEF  |d AU@  |d OCLCQ  |d WYU  |d AUD  |d LEAUB  |d OL$  |d VT2  |d OCLCQ  |d UHL  |d OCLCQ  |d OCLCO  |d LUU  |d OCLCQ  |d INARC  |d OCLCO  |d OCLCL 
049 |a GWRE 
050 4 |a TK5105.88817  |b .T56 2010eb 
100 1 |a Timm, Carl. 
245 1 0 |a Seven deadliest social network attacks /  |c Carl Timm, Richard Perez ; technical editor, Adam Ely. 
260 |a Burlington, MA :  |b Syngress/Elsevier,  |c ©2010. 
300 |a 1 online resource (xxi, 133 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Syngress seven deadliest attacks series 
504 |a Includes bibliographical references and index. 
505 0 |a Social networking infrastructure attacks -- Malware attacks -- Phishing attacks -- Evil twin attacks -- Identity theft -- Cyberbullying -- Physical threats. 
520 |a Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastructure Attacks Malware Attacks Phishing Attacks Evil Twin Attacks Identity Theft Cyber Bullying Physical Threats Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable. 
588 0 |a Print version record. 
650 0 |a Web 2.0  |x Security measures. 
650 0 |a Online social networks  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Malware (Computer software)  |x Prevention. 
650 0 |a Computer crimes  |x Prevention. 
650 7 |a Computer crimes  |x Prevention  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
700 1 |a Perez, Richard,  |d 1969 October 17-  |1 https://id.oclc.org/worldcat/entity/E39PCjwV34TfMG8Dyc6mH6MkjC 
700 1 |a Ely, Adam. 
776 0 8 |i Print version:  |a Timm, Carl.  |t Seven deadliest social network attacks.  |d Burlington, MA : Syngress/Elsevier, ©2010  |z 9781597495455  |w (DLC) 2010014463  |w (OCoLC)612958560 
830 0 |a Syngress seven deadliest attacks series. 
856 4 0 |u https://ucblibraries.skillport.com/skillportfe/main.action?assetid=37231  |z Full Text (via Skillsoft) 
915 |a - 
956 |a Skillsoft ITPro 
956 |b Skillsoft ITPro Skillport Collection 
994 |a 92  |b COD 
998 |b Subsequent record output 
999 f f |i 1338aeb3-e620-5106-9954-228f15bf9135  |s 66639f87-69f2-5b28-bc63-b4fe313ac3d4 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e TK5105.88817 .T56 2010eb  |h Library of Congress classification  |i web  |n 1