Normal view MARC view ISBD view

Malicious Bots : An Inside Look into the Cyber-Criminal Underground of the Internet

By: Dunham, Ken.
Material type: TextTextSeries: eBooks on Demand.Publisher: Hoboken : Taylor & Francis, 2008Description: 1 online resource (170 p.).ISBN: 9781420069068.Subject(s): Computer crimesGenre/Form: Electronic books.Additional physical formats: Print version:: Malicious Bots : An Inside Look into the Cyber-Criminal Underground of the InternetDDC classification: 364.16/8 Online resources: Click here to view this ebook.
Contents:
Front cover; Dedication; Contents; Preface; Acknowledgments and Permissions; About the Authors; Chapter 1. Introduction to Bots; Chapter 2. Thr34t Security Krew and the TK Worm; Chapter 3. Demonstration: How a Hacker Launches a Botnet Attack; Chapter 4. Introduction to the Use of Botnets in Criminal Activity; Chapter 5. Botnets and the eCrime Cycle: The iSIGHT Partnets' Approach; Chapter 6. Technical Introduction to Bots; Chapter 7. Mitigation; Chapter 8. Concluding Thoughts; Glossary; Bibliography; Index; Back cover
Summary: Describes the scope, sophistication, and criminal uses of bots and how to more pro actively protect against them. This book introduces botnet threats and how they function and examines the top bot attacks against financial and government networks.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
HV6773.D86 2009 (Browse shelf) http://uttyler.eblib.com/patron/FullRecord.aspx?p=359999 Available EBL359999
Browsing UT Tyler Online Shelves , Shelving location: Online Close shelf browser
HV6773.52 .A47 2005eb Hate Crimes : HV6773.52 .E4 2009 Hate crimes and ethnoviolence : HV6773 .C477 2009 Profiling Hackers : HV6773.D86 2009 Malicious Bots : HV6773 .H36 2010 Handbook of Internet crime / HV6773 .K74 2010 The global cybercrime industry : HV6773 .S3547 2004 Cybercrime :

Front cover; Dedication; Contents; Preface; Acknowledgments and Permissions; About the Authors; Chapter 1. Introduction to Bots; Chapter 2. Thr34t Security Krew and the TK Worm; Chapter 3. Demonstration: How a Hacker Launches a Botnet Attack; Chapter 4. Introduction to the Use of Botnets in Criminal Activity; Chapter 5. Botnets and the eCrime Cycle: The iSIGHT Partnets' Approach; Chapter 6. Technical Introduction to Bots; Chapter 7. Mitigation; Chapter 8. Concluding Thoughts; Glossary; Bibliography; Index; Back cover

Describes the scope, sophistication, and criminal uses of bots and how to more pro actively protect against them. This book introduces botnet threats and how they function and examines the top bot attacks against financial and government networks.

Description based upon print version of record.

There are no comments for this item.

Log in to your account to post a comment.