|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Markus Jakobsson , Steven MyersPublisher: John Wiley & Sons Inc Imprint: Wiley-Interscience Dimensions: Width: 16.50cm , Height: 3.30cm , Length: 24.20cm Weight: 1.168kg ISBN: 9780471782452ISBN 10: 0471782459 Pages: 736 Publication Date: 09 January 2007 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: Out of stock ![]() The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available. Table of ContentsReviews"""…I highly recommend this as a must-read book in the collection of phishing literature."" (Computing Reviews.com, September 13, 2007) ""…may be used as a textbook or a comprehensive reference for individuals involved with Internet security…"" (CHOICE, July 2007)" ...I highly recommend this as a must-read book in the collection of phishing literature. (Computing Reviews.com, September 13, 2007) ...may be used as a textbook or a comprehensive reference for individuals involved with Internet security... (CHOICE, July 2007) ...I highly recommend this as a must-read book in the collection of phishing literature. (Computing Reviews.com, September 13, 2007) ...may be used as a textbook or a comprehensive reference for individuals involved with Internet security... (CHOICE, July 2007) Author InformationMARKUS JAKOBSSON, PhD, is Associate Professor in the School of Informatics at Indiana University, where he is also Associate Director of the Center for Applied Cybersecurity Research. Dr. Jakobsson is the former editor of RSA CryptoBytes. He is a noted authority on the subject of phishing and is regularly invited to speak on the topic at conferences and workshops. STEVEN MYERS, PhD, is Assistant Professor in the School of Informatics at Indiana University and a member of the University's Center for Applied Cybersecurity Research. Dr. Myers worked on secure email anti-phishing technology at Echoworx Corporation, and has written several papers on cryptography, distributed systems, and probabilistic combinatorics. Tab Content 6Author Website:Countries AvailableAll regions |