Malicious Bots by Dunham

US $23.99
ApproximatelyS$ 31.35
Condition:
Good
Used book in good condition. Shows typical wear. Quick shipping. Satisfaction guaranteed!
Breathe easy. Returns accepted.
Shipping:
US $6.99 (approx S$ 9.14) USPS Media MailTM.
Located in: Multiple Locations, United States
Delivery:
Estimated between Tue, 25 Nov and Wed, 3 Dec
Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the shipping service selected, the seller's shipping history, and other factors. Delivery times may vary, especially during peak periods.
Returns:
30 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)

Shop with confidence

Top Rated Plus
Trusted seller, fast shipping, and easy returns. Learn more- Top Rated Plus - opens in a new window or tab
Seller assumes all responsibility for this listing.
eBay item number:136689643535
Last updated on Nov 19, 2025 03:52:04 SGTView all revisionsView all revisions

Item specifics

Condition
Good
A book that has been read but is in good condition. Very minimal damage to the cover including scuff marks, but no holes or tears. The dust jacket for hard covers may not be included. Binding has minimal wear. The majority of pages are undamaged with minimal creasing or tearing, minimal pencil underlining of text, no highlighting of text, no writing in margins. No missing pages. See all condition definitionsopens in a new window or tab
Seller Notes
“Used book in good condition. Shows typical wear. Quick shipping. Satisfaction guaranteed!”
Book Title
Malicious Bots
Narrative Type
True Crime
Genre
N/A
Intended Audience
N/A
ISBN
9781420069037
Category

About this product

Product Identifiers

Publisher
Auerbach Publishers, Incorporated
ISBN-10
1420069039
ISBN-13
9781420069037
eBay Product ID (ePID)
61646880

Product Key Features

Number of Pages
168 Pages
Language
English
Publication Name
Malicious Bots : an inside Look Into the Cyber-Criminal Underground of the Internet
Subject
Security / General, Information Management, Security / Networking, Information Technology
Publication Year
2008
Type
Textbook
Author
Jim Melnick, Ken Dunham
Subject Area
Computers, Business & Economics
Format
Hardcover

Dimensions

Item Height
0.6 in
Item Weight
14.4 Oz
Item Length
9.6 in
Item Width
6.5 in

Additional Product Features

Intended Audience
College Audience
LCCN
2008-010309
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
364.16/8
Table Of Content
Introduction to Bots Thr34t Security Krew and the TK Worm Demonstration: How a Hacker Launches a Botnet Attack Introduction to the Use of Botnets in Criminal Activity Botnets and the eCrime Cycle: The iSIGHT Partners' Approach Technical Introduction to Bots Mitigation Glossary Bibliography
Synopsis
Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise of dangerous bots and exposes the nefarious methods of "botmasters". This valuable resource assists information security managers in understanding the scope, sophistication, and criminal uses of bots. With sufficient technical detail to empower IT professionals, this volume provides in-depth coverage of the top bot attacks against financial and government networks over the last several years. The book presents exclusive details of the operation of the notorious Thr34t Krew, one of the most malicious bot herder groups in recent history. Largely unidentified by anti-virus companies, their bots spread globally for months, launching massive distributed denial of service (DDoS) attacks and warez (stolen software distributions). For the first time, this story is publicly revealed, showing how the botherders got arrested, along with details on other bots in the world today. Unique descriptions of the criminal marketplace - how criminals make money off of your computer - are also a focus of this exclusive book! With unprecedented detail, the book goes on to explain step-by-step how a hacker launches a botnet attack, providing specifics that only those entrenched in the cyber-crime investigation world could possibly offer. Authors Ken Dunham and Jim Melnick serve on the front line of critical cyber-attacks and countermeasures as experts in the deployment of geopolitical and technical bots. Their work involves advising upper-level government officials and executives who control some of the largest networks in the world. By examining the methods of Internet predators, information security managers will be better able to proactively prote, Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise of dangerous bots and exposes the nefarious methods of "botmasters". This valuable resource assists information security managers in understanding the scope, sophistication, and criminal uses of bots. With sufficient technical detail to empower IT professionals, this volume provides in-depth coverage of the top bot attacks against financial and government networks over the last several years. The book presents exclusive details of the operation of the notorious Thr34t Krew , one of the most malicious bot herder groups in recent history. Largely unidentified by anti-virus companies, their bots spread globally for months, launching massive distributed denial of service (DDoS) attacks and warez (stolen software distributions). For the first time, this story is publicly revealed, showing how the botherders got arrested, along with details on other bots in the world today. Unique descriptions of the criminal marketplace - how criminals make money off of your computer - are also a focus of this exclusive book! With unprecedented detail, the book goes on to explain step-by-step how a hacker launches a botnet attack, providing specifics that only those entrenched in the cyber-crime investigation world could possibly offer. Authors Ken Dunham and Jim Melnick serve on the front line of critical cyber-attacks and countermeasures as experts in the deployment of geopolitical and technical bots. Their work involves advising upper-level government officials and executives who control some of the largest networks in the world. By examining the methods of Internet predators, information security managers will be better able to proactively prote, Originally designed to sabotage or annihilate websites, computerized "Bots" are increasingly used in mass spamming events, fraud, extortion, identity theft, and software theft. Focusing on the malicious use of bots and bot herder means and motivations, Malicious Bots provides a much needed a resource for understanding the scope, sophistication, and criminal uses of bots and how to more proactively protect against them. Accessibly written, but with sufficient technical detail, the book introduces botnet threats and how they function and examines the top bot attacks against financial and government networks over the last four years to reveal the who, how, and why behind them., Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise of dangerous bots and exposes the nefarious methods of "botmasters". This valuable resource assists information security managers in understanding the scope, sophistication, and criminal uses of bots. With sufficient technical detail to empower IT professionals, this volume provides in-depth coverage of the top bot attacks against financial and government networks over the last several years. The book presents exclusive details of the operation of the notorious Thr34t Krew , one of the most malicious bot herder groups in recent history. Largely unidentified by anti-virus companies, their bots spread globally for months, launching massive distributed denial of service (DDoS) attacks and warez (stolen software distributions). For the first time, this story is publicly revealed, showing how the botherders got arrested, along with details on other bots in the world today. Unique descriptions of the criminal marketplace - how criminals make money off of your computer - are also a focus of this exclusive book With unprecedented detail, the book goes on to explain step-by-step how a hacker launches a botnet attack, providing specifics that only those entrenched in the cyber-crime investigation world could possibly offer. Authors Ken Dunham and Jim Melnick serve on the front line of critical cyber-attacks and countermeasures as experts in the deployment of geopolitical and technical bots. Their work involves advising upper-level government officials and executives who control some of the largest networks in the world. By examining the methods of Internet predators, information security managers will be better able to proactively prote
LC Classification Number
HV6773.D86 2008

Item description from the seller

About this seller

Sk1drow Books

96.7% positive feedback14K items sold

Joined Feb 2022

Detailed Seller Ratings

Average for the last 12 months
Accurate description
4.7
Reasonable shipping cost
4.6
Shipping speed
4.8
Communication
4.8

Seller feedback (2,952)

All ratingsselected
Positive
Neutral
Negative
  • t***c (532)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    This item was never shipped but U.S.P.S. showed it as having been delivered. After I contacted the seller, they discovered that it had not been shipped and they did not have one to ship me, so they immediately refunded my money. Seller responded quickly to my inquiry and quickly gave me a refund. Would buy from them again.
  • o***- (4)- Feedback left by buyer.
    Past month
    Verified purchase
    Timely delivery. Well packaged and arrived in good condition. Item was as described. I was happy with the price. Most people selling these volumes charge collectors prices. Seller offered a fair price.
  • o***o (251)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    Fast shipping, great packaging, item as described, good value, awesome seller, thank you, A+++