Browse by category ▼
Browse by Category
Filter by
Format
Author
See more
Publication Year
See more
by: Engebretson, Patrick
  • Format: PDF
  • ISBN: 9780124116412
  • Publication year: 2013
£18.23
Sign in to add to Wish List
by: Grand, Joe/Mitnick, Kevin D./Russell, Ryan
  • Format: PDF
  • ISBN: 9780080478258
  • Publication year: 2004
£24.95
Sign in to add to Wish List
by: Chuvakin, Anton/Williams, Branden R.
  • Format: PDF
  • ISBN: 9781597495394
  • Publication year: 2009
£43.41
Sign in to add to Wish List
by: Flick, Tony/Morehouse, Justin
  • Format: PDF
  • ISBN: 9781597495714
  • Publication year: 2010
£29.75
Sign in to add to Wish List
by: Pauli, Josh
  • Format: PDF
  • ISBN: 9780124166592
  • Publication year: 2013
£18.23
Sign in to add to Wish List
by: Jaishankar, K.
  • Format: PDF
  • ISBN: 9781439829509
  • Publication year: 2011
£33.59
Sign in to add to Wish List
by: Curtis, George
  • Format: PDF
  • ISBN: 9781439858325
  • Publication year: 2011
£32.63
Sign in to add to Wish List

Computer fraud is the act to use a computer to take and edit electronic data. There are different types of computer fraud and the most common are phishing, social engineering, viruses and DDoS attacks.

Firstly, phishing consists of emails which are sent to trick people into divulging their bank information. Usually, the addressee by clicking the link in the email is redirected to a fake website. Here, the user by inserting the bank information, allows phishers to drain his/her bank accounts.

Secondly, social engineering is a term that is related to different malicious activities. Usually, these actions consist of manipulating people to obtain access to systems, networks or physical locations for financial gain.

Thirdly, computer viruses are malicious software programs that, once executed, replicate themselves and modify other computer applications.

Finally, DDoS attacks or Distributed Denial of Service attacks consists of attacking servers, websites or other network resources and provoke a denial of service for users.

Hacking consists of an unauthorized intrusion into a computer or network to access data. The person who is doing hacking activities is known as a hacker and his main goal is to alter system and security features.

Hackers use different types of techniques which are vulnerability scanning, password cracking, packet sniffing, spoofing attack, rootkit, trojan horse, viruses, and keyloggers.

Currently, different corporations are hiring hackers as members of support staff to improve the company security system.

Do you want to know more about these two subjects? Take a look at this category. You will discover a wide range of digital books related to computer fraud and hacking. These ebooks will help you better understand the subject.

Still can’t find the book you need? Take a look at our other categories or different publishers or other authors. We have more than 500,000 ebooks to choose from. Enjoy your reading with Kortext!

Back

Categories

All Categories