
Introduction
In the process of phishing, we have identified the construction of both the type
of Web site and e-mail contents that are used to obtain successful theft of infor-
mation. In Chapters 2 and 3, we demonstrated the use of HTML, JavaScript, and
very basic HTTP header fields. ...