Seven deadliest social network attacks / Carl Timm, Richard Perez ; technical editor, Adam Ely.
نوع المادة :![نص](/opac-tmpl/lib/famfamfam/BK.png)
- text
- unmediated
- volume
- 9781597495455 (pb)
- 159749545X (pbk)
- 7 deadliest social network attacks
- TK5105.888 T58 2010
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK5105.888 T58 2010 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30010000269262 | ||
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK5105.888 T58 2010 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 30010000268146 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
TK5105.888 T56 2001 Tips and tricks for web site managers / | TK5105.888 T56 2001 Tips and tricks for web site managers / | TK5105.888 T58 2010 Seven deadliest social network attacks / | TK5105.888 T58 2010 Seven deadliest social network attacks / | TK5105.888 T73 2003 E-commerce usability : tools and techniques to perfect the on-line experience / | TK5105.888 T73 2003 E-commerce usability : tools and techniques to perfect the on-line experience / | TK5105.888 T88 1995 Walking the World Wide Web : your personal guide to the best of the Web / |
Includes bibliographical references.
Social networking infrastructure attacks -- Malware attacks -- Phishing attacks -- Evil twin attacks -- Identity theft -- Cyberbullying -- Physical threats.
Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastructure Attacks Malware Attacks Phishing Attacks Evil Twin Attacks Identity Theft Cyber Bullying Physical Threats Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.