Malicious Bots: An Inside Look Into the Cyber-Criminal Underground of the Internet
暫譯: 惡意機器人:深入探討網路犯罪地下世界
Dunham, Ken, Melnick, Jim
- 出版商: Auerbach Publication
- 出版日期: 2019-09-19
- 售價: $2,810
- 貴賓價: 9.5 折 $2,670
- 語言: 英文
- 頁數: 168
- 裝訂: Quality Paper - also called trade paper
- ISBN: 0367387034
- ISBN-13: 9780367387037
海外代購書籍(需單獨結帳)
相關主題
商品描述
With sufficient technical detail to empower IT professionals, this volume provides in-depth coverage of the top bot attacks against financial and government networks over the last several years. The book presents exclusive details of the operation of the notorious Thr34t Krew, one of the most malicious bot herder groups in recent history. Largely unidentified by anti-virus companies, their bots spread globally for months, launching massive distributed denial of service (DDoS) attacks and warez (stolen software distributions). For the first time, this story is publicly revealed, showing how the botherders got arrested, along with details on other bots in the world today. Unique descriptions of the criminal marketplace - how criminals make money off of your computer - are also a focus of this exclusive book
With unprecedented detail, the book goes on to explain step-by-step how a hacker launches a botnet attack, providing specifics that only those entrenched in the cyber-crime investigation world could possibly offer.
Authors Ken Dunham and Jim Melnick serve on the front line of critical cyber-attacks and countermeasures as experts in the deployment of geopolitical and technical bots. Their work involves advising upper-level government officials and executives who control some of the largest networks in the world. By examining the methods of Internet predators, information security managers will be better able to proactively prote
商品描述(中文翻譯)
最初設計為中立實體的電腦化機器人,現在越來越多地被網路罪犯惡意使用,參與大規模垃圾郵件事件、詐騙、勒索、身份盜竊和軟體盜竊。《惡意機器人:深入了解網路犯罪地下世界》探討了危險機器人的崛起,揭露了「機器人主」的惡行手法。這本寶貴的資源幫助資訊安全經理了解機器人的範圍、複雜性和犯罪用途。
本書提供足夠的技術細節,以使IT專業人員能夠深入了解過去幾年針對金融和政府網路的主要機器人攻擊。書中呈現了臭名昭著的Thr34t Krew的運作獨家細節,這是近期歷史上最惡意的機器人操控團體之一。這些機器人大多未被防毒軟體公司識別,並在全球範圍內擴散數月,發動大規模的分散式拒絕服務(DDoS)攻擊和盜版軟體分發。這個故事首次公開揭露,展示了這些機器人操控者如何被逮捕,以及當今世界其他機器人的詳細資訊。本書還專注於犯罪市場的獨特描述——罪犯如何利用你的電腦賺錢。
本書以空前的細節解釋了駭客如何逐步發動機器人網路攻擊,提供了只有身處網路犯罪調查領域的人才能提供的具體資訊。
作者Ken Dunham和Jim Melnick作為地緣政治和技術機器人部署的專家,站在關鍵網路攻擊和對策的最前線。他們的工作涉及向控制全球一些最大網路的高層政府官員和高管提供建議。通過檢視網路掠奪者的方法,資訊安全經理將能更好地主動保護。