• Complain

Perez Richard - Seven deadliest social networks attacks

Here you can read online Perez Richard - Seven deadliest social networks attacks full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Boston, year: 2010, publisher: Elsevier Science;Syngress;Elsevier, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Seven deadliest social networks attacks
  • Author:
  • Publisher:
    Elsevier Science;Syngress;Elsevier
  • Genre:
  • Year:
    2010
  • City:
    Boston
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Seven deadliest social networks attacks: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Seven deadliest social networks attacks" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

Attacks detailed in this book include:

  1. Social Networking Infrastructure Attacks
  2. Malware Attacks
  3. Phishing Attacks
  4. Evil Twin Attacks
  5. Identity Theft
  6. Cyber Bullying
  7. Physical Threats
  • Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
    • Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
    • Institute...
  • Perez Richard: author's other books


    Who wrote Seven deadliest social networks attacks? Find out the surname, the name of the author of the book and a list of all author's works by series.

    Seven deadliest social networks attacks — read online for free the complete book (whole text) full work

    Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Seven deadliest social networks attacks" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

    Light

    Font size:

    Reset

    Interval:

    Bookmark:

    Make

    Syngress is an imprint of Elsevier.
    30 Corporate Drive, Suite 400, Burlington, MA 01803, USA

    This book is printed on acid-free paper.

    2010 Elsevier Inc. All rights reserved.

    No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publishers permissions policies, and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our Web site: www.elsevier.com/permissions .

    This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).

    Notices
    Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary.

    Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.

    To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.

    Library of Congress Cataloging-in-Publication Data
    Application submitted

    British Library Cataloguing-in-Publication Data
    A catalogue record for this book is available from the British Library.

    ISBN: 978-1-59749-545-5

    Printed in the United States of America
    10 11 12 13 5 4 3 2 1

    Elsevier Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively Makers) of this book (the Work) do not guarantee or warrant the results to be obtained from the Work.

    For information on rights, translations, and bulk sales, contact Matt Pedersen, Commercial Sales Director and Rights; e-mail:

    For information on all Syngress publications, visit our Web site at www.syngress.com

    Typeset by: diacriTech, Chennai, India

    About the Authors Lead Author Carl Timm is the Regional Director of Security - photo 1

    About the Authors

    Lead Author
    Carl Timm
    is the Regional Director of Security for Savvis Communications. As Regional Director of Security, Mr. Timm is responsible for assisting companies with creating and implementing robust security programs. Mr. Timm has worked in the Information Security area for over 16 years providing security and IT governance consulting services for Fortune 500 companies. Mr. Timm is also an industry-recognized author, having written several books on the topics of security and networking. Mr. Timm holds multiple industry certifications including the CCIE, CISSP, and PMP.

    Contributing Author
    Richard Perez
    (CISSP#121490, CCNP, MCSE, SCSA, CCSE, CNE-3, ITIL) is a senior security, risk and architecture practice manager for Savvis, Inc. He currently provides strategic and technical consulting to clients in the Midwestern United States. His specialties include network and system security, enterprise architecture, business continuity, and disaster recovery.

    Richard holds a Bachelors degree in Computer Science, a Masters degree in Information Technology, and is presently completing his Doctorate in Computer Science. He is a member of the Association for Computing Machinery (ACM), (ISC)2, and InfraGard. Richard currently resides in the Northwest suburbs of Chicago, IL with his wife Kelly and his four sons, Tyler, Stuart, Seth, and Caden.

    Technical Editor
    Adam Ely
    (CISSP, NSA IAM, MCSE) is Director of Corporate Security for TiVo, where he is responsible for IT security and corporate security policies. Adam has held positions with The Walt Disney Company where he was Manager, Information Security Operations for the Walt Disney Interactive Media Group and Senior Manager, Technology for a Walt Disney acquired business. In addition, Adam was a consultant with Alvarez & Marsal where he led security engagements for clients. Adams background focuses on application and infrastructure security. Adam has published numerous application vulnerabilities, application security roadmaps, and other articles.

    Introduction

    INFORMATION IN THIS CHAPTER

    OVERVIEW AND KEY LEARNING POINTS

    What is a social network? Some of you know this already. If you dont, you are about to find out. This book is going to take you through the seven deadliest social networking attacks. Kinda scary sounding, isnt it? Enough with the hubbub. Before we start attacking the social networks, we should probably understand what allows them to run.

    So, what is the basis behind a social network? It is something called Web 2.0. Maybe you have heard of it, maybe you havent it doesnt matter. What is Web 2.0? So glad you asked that question.

    Well, we know what the Web is: it is the World Wide Web. This is a place where we can find anything we want. However, what the heck is Web 2.0? You have heard about it on the Web and you have heard about it from your friends, but you still dont know. Is it the second coming of the Web? No. Is it a new version of the Internet? You are still way off. You probably wont be happy with this explanation keep in mind, neither were we when we found out.

    Right now, you are probably tired of this long drawn-out intro to Web 2.0. However, its like that suspense movie you love so much: it takes a while to get to the point; it is something called dramatic effect. Enough of that. Web 2.0 is a term that was coined by a single person talking to a single company. A man by the name of Tim OReilly was discussing the Internet with Dale Dougherty. They had noted that far from having crashed, the Web was more important than ever, with exciting new applications and sites popping up with surprising regularity. Whats more, the companies that had survived the collapse seemed to have some things in common. Could it be that the dot-com collapse marked some kind of turning point for the Web, such that a call to action such as Web 2.0 might make sense? We agreed it did, and so the Web 2.0 conference was born. Dont you like history? Hope so!!

    You really have to keep in mind that the list went on and on and on. This is only a brief list. By now you have to be asking yourself, What makes something 1.0 and something 2.0? This is a very valid question. We are asking ourselves the same questionPicture 2 Not really.

    So what are the differences, you ask? Well, lets find out. Take a look at .

    What does this all mean to us, you may ask? It makes our lives easier; however, it also makes our lives more complicated. What does that mean? It means that at the cost of having a more enjoyable browsing life, the ease of use, we become victim to the information shared. By this time, you are probably ready for a bit more insight. That is exactly what you are going to receive. At this time, it is time to focus on the social networking sites, which is based upon Web 2.0.

    Social networks are sites that have exploded into the tech scene with a considerable amount of popularity and fanfare. At first, many people (including myself) felt that social networking was nothing more than a fad. However, in 2006, advertising on U.S.-based social networking sites such as MySpace and Facebook accumulated over $350 million dollars (US). Facebook appears to be leading the charge as one of the hottest growing social networks. With an active user count of over 60 million subscribers and with more than 13 thousand applications at its disposal, there is a wide expanse to express ideas, collaborate, and collect information. Facebook as of this writing stands as the fourth largest Web site in the world, having grown 157% (trailing only Google, Microsoft, and Yahoo). Twitter, between the years of 2008 and 2009, grew by 1,928% in the United States alone. Growth within the social networking segment as derived from Forrester Research LinkedIn currently has an active user count that now exceeds 30 million users globally in a span of five years.

    Next page
    Light

    Font size:

    Reset

    Interval:

    Bookmark:

    Make

    Similar books «Seven deadliest social networks attacks»

    Look at similar books to Seven deadliest social networks attacks. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


    Reviews about «Seven deadliest social networks attacks»

    Discussion, reviews of the book Seven deadliest social networks attacks and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.