Phishing Exposed provides an in-depth, high-tech view from both sides of the phishing playing field. In this unprecedented book, world-renowned phishing expert Lance James exposes the technical and financial techniques used by international clandestine phishing gangs to steal billions of dollars every year. The book is filled with technically detailed forensic examinations of real phishing scams. Armed with this invaluable intelligence, law enforcement officers, system administrators, and fraud investigators can resolve existing cases and prevent future attacks.
Identify the Three Classes of Phishing Attacks-- Go behind the scenes to learn how phishing gangs execute impersonation, forwarding, and popup attacks.
Uncover Phishing Servers and Blind Drops-- Follow the trail from hostile Web servers to anonymous e-mail accounts where stolen data is stored.
Learn How E-mail Addresses Are Harvested-- See how phishers use bots and crawlers to scour the Internet for valid e-mall addresses to attack.
Detect Cross-Site Scripting (CSS) Attacks-- Watch as phishers use CSS attacks to hijack browsers, steal cookies, and run malicious code on Web browsers.
Exploit the Secure Sockets Layer (SSL--) Implement cross-user vulnerabilities to render SSL certificates null and void.
Follow the Money -- Untangle the intricate web of international money laundering.
See the Future of Phishing-- Learn how new pharming techniques use DNS poisoning to redirect online traffic to a malicious computer.
Go Phishing -- Send phishing e-mails you have received to author Lance James for analysis
Chapter 1 Banking On Phishing
Chapter 2 Go Phish!
Chapter 3 E-Mail: The Weapon of Mass Delivery
Chapter 4 Crossing the Phishing Line
Chapter 6 Malware, Money Movers, and Ma Bell Mayhem!
Chapter 7 So Long, and Thanks for All the Phish!
Multicarrier Techniques for 4G Mobile Communications At recent major international conferences on wireless communications,
there have been several sessions on beyond third generation (3G) or fourth
generation (4G) mobile communications systems, where modulation/demodulation
and multiplexing/multiple access schemes related to multicarrier
techniques have drawn a lot of attention....
Wireless Technology: Protocols, Standards, and Techniques We can always wait a bit longer to write a better book on technology.We can
always wait . . .
In this ever-changing technological scenario, keeping pace with the rapid
evolution of wireless technology is a formidable, exciting, and indispensable
task more than a challenge. The work is indeed herculean and often...
Solar Image Analysis and Visualization This title collects refereed papers submitted to the Third Solar Image Processing Workshop, (6-8 September, 2006, Trinity College Dublin, Ireland). The workshop brought together researchers in image processing and solar physics to focus on the challenges presented by new ground-based and space-based instrumentation. Topics covered include image... Strategic Project Management Made Simple: Practical Tools for Leaders and Teams
When Fortune Magazine estimated that 70% of all strategies fail, it also noted that most of these strategies were basically sound, but could not be executed. The central premise of Strategic Project Management Made Simple is that most projects and strategies never get off the ground because of adhoc, haphazard, and obsolete methods used to...
Go beyond the basics and master the next generation of Hadoop data processing platforms
About This Book
Learn how to optimize Hadoop MapReduce, Pig and Hive
Dive into YARN and learn how it can integrate Storm with Hadoop
Understand how Hadoop can be deployed on the cloud...