Phishing and Online Scams in China
This is a modal window.
The media could not be loaded, either because the server or network failed or because the format is not supported.
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | 122 | |
Author | ||
License | CC Attribution 3.0 Unported: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/40581 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
00:00
Exploit (computer security)Scripting languageJava appletComputer virusMathematical analysisText editorFamilyComputer architectureShared memoryMachine visionDifferent (Kate Ryan album)Sinc functionPhishingProduct (business)Mathematical analysisWeb 2.0
00:40
Bookmark (World Wide Web)WebsiteFacebookTraffic reportingPhishingComputer animation
01:42
CASE <Informatik>FacebookSimilarity (geometry)
02:01
Focus (optics)WebsiteOctahedronTraffic reportingContrast (vision)Physical systemCubeState of matterAreaMedical imagingCollaborationismPhishingThread (computing)
03:05
Event horizonPhishingMessage passingToken ringWebsiteCategory of beingEmailInformationWeb pageGame theoryAbelian categoryUniform resource locatorService (economics)Group actionHacker (term)PasswordWebsiteoutputCategory of beingLoginWeb pageShared memoryMedical imagingLink (knot theory)Exception handlingEmailPhishingMessage passingMassComputer clusterEvent horizonWorkstation <Musikinstrument>WindowInjektivität2 (number)InformationService (economics)Game theoryDataflowAlgorithmKey (cryptography)TouchscreenProcedural programmingFormal verificationHeat transferPhysicalismPhysical systemOrder (biology)Coefficient of determinationReal numberComputer simulationPopup-FensterIdentity managementSoftware development kitQueue (abstract data type)Power (physics)WordParameter (computer programming)Casting (performing arts)Personal digital assistantMultiplication sign
09:41
Lie groupInformation securityHoaxSearch engine (computing)Figurate number
10:12
WebsiteWordPhishingDemo (music)Recursive descent parserDomain nameDigital photographyTowerMultiplication signFreewareLine (geometry)WebsiteShared memoryPhishingFlagVideoconferencing
11:57
EmailHydraulic jumpComputer iconHacker (term)Web pageWebsiteSource codeOrder (biology)Message passingSimilarity (geometry)NumberPasswordResultantWebcamFigurate numberRight angleConstructor (object-oriented programming)Musical ensembleDot productGraph coloringWindowDiscounts and allowancesRecursive descent parserSymbol tableWater vapor
14:21
Template (C++)WebsiteSource codeSource codeWebsiteLecture/Conference
14:47
Software frameworkSource codeSource codePlastikkarteWeb pageDifferent (Kate Ryan album)RootRandom matrixWebsite
15:15
Software frameworkSource codeFood energyWebsiteNumberArithmetic meanPhysical systemData managementRückkehrpunktWater vaporSystem administratorPasswordMenu (computing)Different (Kate Ryan album)Computer animation
16:08
WebsiteSimilarity (geometry)Content (media)Visual systemServer (computing)Instant MessagingUniform resource locatorPasswordInformationPhishingCharacteristic polynomialWebsiteServer (computing)Coma BerenicesLecture/Conference
Transcript: English(auto-generated)