000 | 05168cam a2200721Ii 4500 | ||
---|---|---|---|
001 | ocn905490497 | ||
003 | OCoLC | ||
005 | 20171025085921.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 150323t20152015inua ob 001 0 eng d | ||
020 |
_a9781118958490 _qelectronic bk. |
||
020 |
_a1118958497 _qelectronic bk. |
||
020 |
_a9781118958483 _qelectronic bk. |
||
020 |
_a1118958489 _qelectronic bk. |
||
020 | _z9781118958476 | ||
020 | _z1118958470 | ||
020 | _a9781119183624 | ||
020 | _a1119183626 | ||
024 | 8 | _a12350206 | |
029 | 1 |
_aDEBBG _bBV042683513 |
|
029 | 1 |
_aDEBSZ _b446587184 |
|
029 | 1 |
_aCHSLU _b001221858 |
|
029 | 1 |
_aDEBSZ _b453328806 |
|
029 | 1 |
_aGBVCP _b823554597 |
|
029 | 1 |
_aDEBBG _bBV043615820 |
|
029 | 1 |
_aDEBBG _bBV043737974 |
|
035 |
_a(OCoLC)905490497 _z(OCoLC)905994359 _z(OCoLC)910165715 _z(OCoLC)926298159 _z(OCoLC)938507249 _z(OCoLC)961646400 _z(OCoLC)962625058 |
||
037 |
_aCL0500000595 _bSafari Books Online |
||
037 |
_a40BE1AD8-74C7-49B9-88D2-38870F93202D _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
040 |
_aN$T _beng _erda _epn _cN$T _dN$T _dBAL _dCDX _dIDEBK _dE7B _dYDXCP _dOCLCF _dEBLCP _dBAB _dRECBK _dUMI _dDEBBG _dTEFOD _dDEBSZ _dOCLCQ _dW2U _dDG1 _dBAL _dKSU _dCOO _dD6H _dK6U |
||
049 | _aMAIN | ||
050 | 4 |
_aHV6773.15.P45 _bH33 2015eb |
|
072 | 7 |
_aSOC _x004000 _2bisacsh |
|
082 | 0 | 4 |
_a364.1632 _223 |
100 | 1 |
_aHadnagy, Christopher, _eauthor. |
|
245 | 1 | 0 |
_aPhishing dark waters : the offensive and defensive sides of malicious emails / _cChristopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke. _h[electronic resource] |
264 | 1 |
_aIndianapolis, IN : _bWiley, _c[2015] |
|
264 | 4 | _c©2015 | |
300 |
_a1 online resource : _bcolor illustrations. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aAn Introduction to the Wild World of Phishing -- The Psychological Principles of Decision-Making -- Influence and Manipulation -- Lessons in Protection -- Plan Your Phishing Trip: Creating the Enterprise Phishing Program -- The Good, the Bad, and the Ugly: Policies and More -- The Professional Phisher's Tackle Bag -- Phish Like a Boss. | |
520 | _a"An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program. Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer. Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay. Learn what a phish is, and the deceptive ways they've been used Understand decision-making, and the sneaky ways phishers reel you in Recognize different types of phish, and know what to do when you catch one Use phishing as part of your security awareness program for heightened protection Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. Phishing Dark Waters is an indispensable guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe"--publisher's description. | ||
588 | 0 | _aPrint version record. | |
650 | 0 | _aPhishing. | |
650 | 0 | _aElectronic mail messages. | |
650 | 7 |
_aSOCIAL SCIENCE / Criminology _2bisacsh |
|
650 | 7 |
_aElectronic mail messages. _2fast _0(OCoLC)fst00907328 |
|
650 | 7 |
_aPhishing. _2fast _0(OCoLC)fst01737436 |
|
650 | 4 | _aComputer crimes. | |
650 | 4 | _aComputer security. | |
650 | 4 | _aHackers. | |
650 | 4 | _aSocial engineering. | |
655 | 4 | _aElectronic books. | |
700 | 1 |
_aFincher, Michele, _eauthor. |
|
700 | 1 |
_aDreeke, Robin, _ewriter of supplementary textual content. |
|
776 | 0 | 8 |
_iPrint version: _aHadnagy, Christopher. _tPhishing Dark Waters : The Offensive and Defensive Sides of Malicious Emails _z9781118958476 _w(OCoLC)904332085 |
856 | 4 | 0 |
_uhttp://onlinelibrary.wiley.com/book/10.1002/9781119183624 _zWiley Online Library |
942 |
_2ddc _cBK |
||
999 |
_c207949 _d207949 |