Malicious Bots : An Inside Look into the Cyber-Criminal Underground of the Internet
By: Dunham, Ken.
Material type:
Item type | Current location | Call number | URL | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Electronic Book | UT Tyler Online Online | HV6773.D86 2009 (Browse shelf) | http://uttyler.eblib.com/patron/FullRecord.aspx?p=359999 | Available | EBL359999 |
Browsing UT Tyler Online Shelves , Shelving location: Online Close shelf browser
|
|
|
|
|
|
|
||
HV6773.52 .A47 2005eb Hate Crimes : | HV6773.52 .E4 2009 Hate crimes and ethnoviolence : | HV6773 .C477 2009 Profiling Hackers : | HV6773.D86 2009 Malicious Bots : | HV6773 .H36 2010 Handbook of Internet crime / | HV6773 .K74 2010 The global cybercrime industry : | HV6773 .S3547 2004 Cybercrime : |
Front cover; Dedication; Contents; Preface; Acknowledgments and Permissions; About the Authors; Chapter 1. Introduction to Bots; Chapter 2. Thr34t Security Krew and the TK Worm; Chapter 3. Demonstration: How a Hacker Launches a Botnet Attack; Chapter 4. Introduction to the Use of Botnets in Criminal Activity; Chapter 5. Botnets and the eCrime Cycle: The iSIGHT Partnets' Approach; Chapter 6. Technical Introduction to Bots; Chapter 7. Mitigation; Chapter 8. Concluding Thoughts; Glossary; Bibliography; Index; Back cover
Describes the scope, sophistication, and criminal uses of bots and how to more pro actively protect against them. This book introduces botnet threats and how they function and examines the top bot attacks against financial and government networks.
Description based upon print version of record.
There are no comments for this item.