Cargando…

Understanding Social Engineering Based Scams

This book describes trends in email scams and offers tools and techniques to identify such trends. It also describes automated countermeasures based on an understanding of the type of persuasive methods used by scammers. It reviews both consumer-facing scams and enterprise scams, describing in-depth...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Jakobsson, Markus (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer New York : Imprint: Springer, 2016.
Edición:1st ed. 2016.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-1-4939-6457-4
003 DE-He213
005 20220116035347.0
007 cr nn 008mamaa
008 160913s2016 xxu| s |||| 0|eng d
020 |a 9781493964574  |9 978-1-4939-6457-4 
024 7 |a 10.1007/978-1-4939-6457-4  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Understanding Social Engineering Based Scams  |h [electronic resource] /  |c edited by Markus Jakobsson. 
250 |a 1st ed. 2016. 
264 1 |a New York, NY :  |b Springer New York :  |b Imprint: Springer,  |c 2016. 
300 |a XVI, 130 p. 51 illus., 18 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Scams and Targeting -- Identifying Scams and Trends -- Predicting Trends -- Persuasion in Scams -- Traditional Countermeasures to Unwanted Email -- Obfuscation in Spam and Scam -- Semantic Analytics of Messages -- Case Study: Sales Scams -- Case Study: Rental Scams -- Case Study: Romance Scams -- Case Study: Business Email Compromise -- Conclusion and Next Steps. 
520 |a This book describes trends in email scams and offers tools and techniques to identify such trends. It also describes automated countermeasures based on an understanding of the type of persuasive methods used by scammers. It reviews both consumer-facing scams and enterprise scams, describing in-depth case studies relating to Craigslist scams and Business Email Compromise Scams. This book provides a good starting point for practitioners, decision makers and researchers in that it includes alternatives and complementary tools to the currently deployed email security tools, with a focus on understanding the metrics of scams. Both professionals working in security and advanced-level students interested in privacy or applications of computer science will find this book a useful reference. 
650 0 |a Data protection. 
650 0 |a Application software. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 1 4 |a Data and Information Security. 
650 2 4 |a Computer and Information Systems Applications. 
650 2 4 |a Cryptology. 
700 1 |a Jakobsson, Markus.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781493964550 
776 0 8 |i Printed edition:  |z 9781493964567 
776 0 8 |i Printed edition:  |z 9781493982066 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-1-4939-6457-4  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)