Engineering & Transportation
Qty:1
  • List Price: $114.00
  • Save: $23.87 (21%)
Only 1 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
Want it Tuesday, April 22? Order within and choose One-Day Shipping at checkout. Details
Used: Like New | Details
Sold by pandabooks1978
Condition: Used: Like New
Comment: all pages mint and crisp binding tight cover clean ex lib with normal lib stamps and stickers with out stmaps book would of been listed as new mint ! priced to sell
Add to Cart
Trade in your item
Get a $1.19
Gift Card.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft Hardcover

ISBN-13: 978-0471782452 ISBN-10: 0071475540 Edition: 1st

Amazon Price New from Used from Collectible from
Hardcover
"Please retry"
$90.13
$79.00 $32.15

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student



Frequently Bought Together

Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft + Phishing Exposed
Price for both: $137.33

Buy the selected items together
  • Phishing Exposed $47.20

Customers Who Viewed This Item Also Viewed

NO_CONTENT_IN_FEATURE

Big Spring Books
Editors' Picks in Spring Releases
Ready for some fresh reads? Browse our picks for Big Spring Books to please all kinds of readers.

Product Details

  • Hardcover: 736 pages
  • Publisher: Wiley-Interscience; 1 edition (December 15, 2006)
  • Language: English
  • ISBN-10: 0071475540
  • ISBN-13: 978-0471782452
  • ASIN: 0471782459
  • Product Dimensions: 9.5 x 6.5 x 1.5 inches
  • Shipping Weight: 2.5 pounds (View shipping rates and policies)
  • Average Customer Review: 4.3 out of 5 stars  See all reviews (3 customer reviews)
  • Amazon Best Sellers Rank: #1,929,351 in Books (See Top 100 in Books)

Editorial Reviews

Review

"…I highly recommend this as a must-read book in the collection of phishing literature." (Computing Reviews.com, September 13, 2007)

"…may be used as a textbook or a comprehensive reference for individuals involved with Internet security…" (CHOICE, July 2007)

From the Back Cover

"This book is the encyclopedia of phishing. It provides views from the payment, human, and technical perspectives. The material is remarkably readable—each chapter is contributed by an expert on that topic, but none require specialized background on the part of the reader. The text will be useful for any professional who seeks to understand phishing."
—Directors of the International Financial Cryptography Association (IFCA)

Phishing attacks, or the practice of deceiving people into revealing sensitive data on a computer system, continue to mount. Here is the information you need to understand how phishing works, how to detect it, and how to prevent it.

Phishing and Countermeasures begins with a technical introduction to the problem, setting forth the tools and techniques that phishers use, along with current security technology and countermeasures that are used to thwart them. Readers are not only introduced to current techniques of phishing, but also to emerging and future threats and the countermeasures that will be needed to stop them. The potential and limitations of all countermeasures presented in the text are explored in detail. In spite of the fact that phishing attacks constantly evolve, much of the material in this book will remain valid, given that the book covers the general principles as much as actual instances of phishing.

While delving into a myriad of countermeasures and defense strategies, the authors also focus on the role of the user in preventing phishing attacks. The authors assert that countermeasures often fail not for technical reasons, but rather because users are unable or unwilling to use them. In response, the authors present a number of countermeasures that are simple for users to implement, or that can be activated without a user's direct participation. Moreover, the authors propose strategies for educating users. The text concludes with a discussion of how researchers and security professionals can ethically and legally perform phishing experiments to test the effectiveness of their defense strategies against the strength of current and future attacks.

Each chapter of the book features an extensive bibliography to help readers explore individual topics in greater depth. With phishing becoming an ever-growing threat, the strategies presented in this text are vital for technical managers, engineers, and security professionals tasked with protecting users from unwittingly giving out sensitive data. It is also recommended as a textbook for students in computer science and informatics.


More About the Author

Dr. Markus Jakobsson writes about various aspects of Internet security, aiming for an audience of technically interested readers, without requiring deep prior knowledge of computer science, mathematics or security.

He is Principal Scientist at Paypal, and has previously held positions at Bell Labs, RSA Labs, Xerox PARC, Indiana University and New York University. He has a PhD in computer science from University of California at San Diego. Dr. Jakobsson does research on mobile commerce, malware, authentication, user education, user interfaces and phishing. He is an inventor of more than 100 US and international patents and patents pending and the co-founder of two startups.

His webpage is www.markus-jakobsson.com

Customer Reviews

4.3 out of 5 stars
5 star
2
4 star
0
3 star
1
2 star
0
1 star
0
See all 3 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

0 of 1 people found the following review helpful By W Boudville HALL OF FAMETOP 1000 REVIEWERVINE VOICE on December 24, 2006
Format: Hardcover Verified Purchase
Phishing is a dangerous phenomenon. But only in recent years has it become common. Another way of seeing this is to note that this book is only the third devoted to phishing. The first two were published in 2005. (Whereas generic spam was already sufficiently a problem in 1998 that a book appeared then, with some primitive antispam methods.) Jakobsson and Myers have assembled a formidable set of articles that define phishing, its dangers and countermeasures. The text explains why phishing stands separate from spam. In part because it is always fraudulant, whereas some spam actually offers real goods and services.

Concerning dangers, Jakobsson and others describe experiments where they sent simulated phishing messages to university students. Response rates were disturbingly high. This from an educated group! The book also cites other studies which reveal that phishing messages and their websites can be very professionally done, and can sometimes fool even experts.

However, the countermeasures described in the book have severe disadvantages, some of which, though not all, are described in the text.

Consider making a blacklist of known phishing sites. This might be done at some central website. With a browser toolbar distributed to users, so that when a user goes to some URL, the toolbar checks the domain against the blacklist, which it gets from the central site. But phishing tests the very concept of a blacklist to destruction. Phishers can subvert many computers, scattered across the Internet, to act as fake websites. So identifying one of these as a phishing site has little efficacy.

Plus a blacklist is inherently reactive. How is a website classified as phishing? Often, if not invariably, by manual scrutiny.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 6 people found the following review helpful By Zulfikar Ramzan on November 6, 2007
Format: Hardcover
Phishing and Countermeasures is the best (and only!) extensive resource on phishing for researchers that I'm aware of. The book not only applies to technical security researchers, but also to those interested in researching phishing from other vantages -- such as the social, legal, or policy-oriented implications. Also, the book does an excellent job of considering more cutting-edge trends, such as the impact of additional social context in phishing attacks. This book absolutely belongs on the desk of anyone with serious interests in both understanding and combating phishing.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 12 people found the following review helpful By S. Stamm on February 13, 2007
Format: Hardcover
"Phishing and Countermeasures" (P&C) does an excellent job of summing-up the state of Phishing attacks and research. It describes--in depth--technical attacks and countermeasures to the attacks, presenting both points of view in an extremely complex problem.

Phishing is not a simple technical or social exploit, it is a process. P&C breaks the process down into little bits, describing in depth how each portion accomplishes its goals. They show technical and social techniques used by Phishers, and then delve into theoretical extensions of phishing attacks, including context-aware attacks (spear phishing) and other advanced data gathering techniques (browser history snooping, accoustic keyboard monitoring, etc). They make it obvious to a reader that Phishing is not a simple problem, and also that it is not yet fully understood.

The sheer volume of countermeasures, coupled with the fact that I get new phishing emails daily, simply backs up the book's claim on Phishing's complexity. There is no one technical solution to Phishing attacks, there are LOTS of them, and this book provides an encyclopedic view of the myriad technical countermeasures, complete with analysis of what the countermeasures can and cannot accomplish.

Aside from looking at technical and human-oriented design countermeasures, P&C presents a legal and ethical look at understanding Phishing. Usually lacking from texts like this, coverage of legal and ethical issues rounds the book out nicely.

Do not read this book if you expect to learn how to completely stop Phishing attacks. Phishing is not a solved problem, so the solutions presented within are helpful measures only -- they make it harder for Phishers to succeed.
Read more ›
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Product Images from Customers

Search
ARRAY(0xa6f472c4)

What Other Items Do Customers Buy After Viewing This Item?