Phishing Exposed by Lance JamesPhishing Exposed by Lance James

Phishing Exposed

byLance JamesEditorLance James

Paperback | December 14, 2005

Pricing and Purchase Info

$72.15 online 
$75.95 list price save 5%
Earn 361 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry.

Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today.

This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers.

* Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts
* Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic
* Stay one step ahead of the enemy with all the latest information
Title:Phishing ExposedFormat:PaperbackDimensions:450 pages, 9 × 7 × 0.68 inPublished:December 14, 2005Publisher:Syngress PublishingLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:159749030X

ISBN - 13:9781597490306

Look for similar items by category:

Reviews

Table of Contents

1 The art of Research
2 Email Effectiveness
3 Where's The Money
4 Lawful Forensics
5 Malware and XSS 5
6 Telephony Exploitation
7.0 Final Analysis