<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <nonSort>The </nonSort>
    <title>death of the Internet</title>
  </titleInfo>
  <name type="personal">
    <namePart>Jakobsson, Markus.</namePart>
  </name>
  <name type="corporate">
    <namePart>ebrary, Inc</namePart>
  </name>
  <typeOfResource>text</typeOfResource>
  <genre authority="marc">bibliography</genre>
  <genre authority="local">Electronic books.</genre>
  <originInfo>
    <place>
      <placeTerm type="code" authority="marccountry">nju</placeTerm>
    </place>
    <place>
      <placeTerm type="text">Hoboken, N.J</placeTerm>
    </place>
    <publisher>IEEE Press, Computer Society, Wiley, Higher Education Press</publisher>
    <dateIssued>2012</dateIssued>
    <issuance>monographic</issuance>
  </originInfo>
  <language>
    <languageTerm authority="iso639-2b" type="code">eng</languageTerm>
  </language>
  <physicalDescription>
    <form authority="marcform">electronic</form>
    <form authority="gmd">electronic resource</form>
    <extent>xxiv, 361 p. : ill.</extent>
  </physicalDescription>
  <abstract>"Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and governments. This book will examine these and related topics, such as smart phone based web security. This book describes the basic threats to the Internet (loss of trust, loss of advertising revenue, loss of security) and how they are related. It also discusses the primary countermeasures and how to implement them"--</abstract>
  <tableOfContents>pt. 1. The problem -- pt. 2. Thinking about solutions.</tableOfContents>
  <note type="statement of responsibility">edited by Markus Jakobsson.</note>
  <note>Includes bibliographical references and index.</note>
  <note>Electronic reproduction. Palo Alto, Calif. : ebrary, 2011. Available via World Wide Web. Access may be limited to ebrary affiliated libraries.</note>
  <subject authority="lcsh">
    <topic>Internet</topic>
    <topic>Security measures</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Electronic commerce</topic>
    <topic>Security measures</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Data protection</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Computer crimes</topic>
  </subject>
  <classification authority="lcc">TK5105.875.I57 D43 2012eb</classification>
  <classification authority="ddc" edition="23">005.8</classification>
  <identifier type="isbn" invalid="yes"/>
  <identifier type="isbn" invalid="yes"/>
  <identifier type="lccn" invalid="yes"/>
  <identifier type="uri">http://site.ebrary.com/lib/rucke/Doc?id=10580207</identifier>
  <location>
    <url>http://site.ebrary.com/lib/rucke/Doc?id=10580207</url>
  </location>
  <recordInfo>
    <recordContentSource authority="marcorg">CaPaEBR</recordContentSource>
    <recordCreationDate encoding="marc">111115</recordCreationDate>
    <recordIdentifier source="CaPaEBR">ebr10580207</recordIdentifier>
  </recordInfo>
</mods>
