Atjaunināt sīkdatņu piekrišanu

Spyware and Adware 2011 ed. [Hardback]

  • Formāts: Hardback, 146 pages, height x width: 235x155 mm, weight: 890 g, XIV, 146 p., 1 Hardback
  • Sērija : Advances in Information Security 50
  • Izdošanas datums: 23-Sep-2010
  • Izdevniecība: Springer-Verlag New York Inc.
  • ISBN-10: 0387777407
  • ISBN-13: 9780387777405
Citas grāmatas par šo tēmu:
  • Hardback
  • Cena: 91,53 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 107,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Hardback, 146 pages, height x width: 235x155 mm, weight: 890 g, XIV, 146 p., 1 Hardback
  • Sērija : Advances in Information Security 50
  • Izdošanas datums: 23-Sep-2010
  • Izdevniecība: Springer-Verlag New York Inc.
  • ISBN-10: 0387777407
  • ISBN-13: 9780387777405
Citas grāmatas par šo tēmu:
Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field.





Spyware and Adware is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry.
1 Introduction 1(8)
1.1 Definitions and History
1(3)
1.2 Motivation
4(5)
2 Getting There 9(20)
2.1 Installation
9(11)
2.1.1 Explicit, Voluntary Installation
9(1)
2.1.2 Drive-by Downloads, User Involvement
10(6)
2.1.3 Drive-by Downloads, No User Involvement
16(3)
2.1.4 Installation via Malware
19(1)
2.2 Startup
20(9)
2.2.1 Application-Specific Startup
20(1)
2.2.2 GUI Startup
21(1)
2.2.3 System Startup
22(1)
2.2.4 Kernel Startup
22(1)
2.2.5 Defenses
23(6)
3 Staying There 29(16)
3.1 Avoiding Detection
29(8)
3.1.1 Basic Detection Avoidance
29(3)
3.1.2 Anti-Spyware
32(1)
3.1.3 Advanced Detection Avoidance: Rootkits
33(4)
3.2 Avoiding Uninstall
37(8)
3.2.1 Passive Avoidance
37(1)
3.2.2 Active Avoidance
38(7)
4 Keylogging 45(14)
4.1 User Space Keylogging
47(2)
4.1.1 Polling
47(1)
4.1.2 Event Copying
48(1)
4.1.3 Event Monitoring
48(1)
4.2 User Space Keylogging Defenses
49(4)
4.3 Authentication
53(6)
5 Phoning Home 59(12)
5.1 Push vs. Pull
59(2)
5.2 Finding Home
61(2)
5.3 Steganography
63(3)
5.4 Information Leaking Defenses
66(5)
6 Advertising 71(20)
6.1 Types of Advertisement
71(12)
6.1.1 Banner Advertisement
74(1)
6.1.2 Banner Advertisement with Pull-down Menu
75(1)
6.1.3 Expandable Banner Advertisement
76(1)
6.1.4 Pushdown Banner Advertisement
77(1)
6.1.5 Pop-up Advertisement
77(1)
6.1.6 Pop-under Advertisement
78(1)
6.1.7 Floating Advertisement
79(1)
6.1.8 Tear-back Advertisement
79(1)
6.1.9 In-text Advertisement
80(1)
6.1.10 Transition Advertisement
81(1)
6.1.11 Video Advertisements
82(1)
6.2 Intent and Content
83(8)
7 Advertisement Implementation 91(20)
7.1 Implementation Location
92(7)
7.1.1 Implementation on the User Machine
92(4)
7.1.2 Implementation in the Network
96(1)
7.1.3 Implementation near the User Machine
97(1)
7.1.4 Implementation on the Server
98(1)
7.2 Choosing Keywords
99(2)
7.3 Blocking Advertisements
101(10)
7.3.1 Pop-up Blocking
101(1)
7.3.2 General Advertisement Blocking
102(1)
7.3.3 Blocker Evasion and Blocker Blocking
103(8)
8 Tracking Users 111(16)
8.1 Cookies
111(7)
8.1.1 Defenses
116(1)
8.1.2 Other Browser-Related Tracking Methods
117(1)
8.2 User Profiling
118(9)
8.2.1 Cognitive Styles, Mood, and Personality
119(1)
8.2.2 Future Actions
119(1)
8.2.3 Demographic Information
120(1)
8.2.4 Social Networks
120(1)
8.2.5 Real World Activities
121(1)
8.2.6 Physical Location
121(1)
8.2.7 Search Terms and Keywords
122(1)
8.2.8 Disinterests
122(5)
9 Conclusion 127(2)
References 129(14)
Index 143
John Aycock is an associate professor at the University of Calgary in the Department of Computer Science. He received a B.Sc. from the University of Calgary, and an M.Sc. and Ph.D. from the University of Victoria. He researches computer security, focusing on malicious software, spam, and online crime. Dr. Aycock conceived and taught the University's Computer Viruses and Malware and Spam and Spyware courses.