Crimeware: Understanding New Attacks and Defenses
“This book is the most current and comprehensive analysis of the state of Internet security threats right now. The review of current issues and predictions about problems years away are critical for truly understanding crimeware. Every concerned person should have a copy and use it for reference.”
—Garth Bruen, Project KnujOn Designer
There’s a new breed of online predators—serious criminals intent on stealing big bucks and top-secret information—and their weapons of choice are a dangerous array of tools called “crimeware.” With an ever-growing number of companies, organizations, and individuals turning to the Internet to get things done, there’s an urgent need to understand and prevent these online threats.
Crimeware: Understanding New Attacks and Defenses will help security professionals, technical managers, students, and researchers understand and prevent specific crimeware threats. This book guides you through the essential security principles, techniques, and countermeasures to keep you one step ahead of the criminals, regardless of evolving technology and tactics. Security experts Markus Jakobsson and Zulfikar Ramzan have brought together chapter contributors who are among the best and the brightest in the security industry. Together, they will help you understand how crimeware works, how to identify it, and how to prevent future attacks before your company’s valuable information falls into the wrong hands. In self-contained chapters that go into varying degrees of depth, the book provides a thorough overview of crimeware, including not only concepts prevalent in the wild, but also ideas that so far have only been seen inside the laboratory.
With this book, you will
With contributions by Gary McGraw, Andrew Tanenbaum, Dave Cole, Oliver Friedrichs, Peter Ferrie, and others.
What people are saying - Write a review
2 A Taxonomy of Coding Errors
3 Crimeware and PeertoPeer Networks
4 Crimeware in Small Devices
5 Crimeware in Firmware
6 Crimeware in the Browser
7 Bot Networks
11 Online Advertising Fraud
12 Crimeware Business Models
13 The Educational Aspect of Security
14 Surreptitious Code and the Law
15 Crimeware and Trusted Computing
16 Technical Defense Techniques
17 The Future of Crimeware
9 Virtual Worlds and Fraud
10 Cybercrime and Politics