Cargando…

Phishing dark waters : the offensive and defensive sides of malicious emails /

"An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the vie...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Hadnagy, Christopher (Autor), Fincher, Michele (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, IN : Wiley, [2015]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn905490497
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 150323t20152015inua ob 001 0 eng d
010 |z  2015933609 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d BAL  |d CDX  |d IDEBK  |d E7B  |d YDXCP  |d OCLCF  |d EBLCP  |d BAB  |d RECBK  |d UMI  |d DEBBG  |d TEFOD  |d DEBSZ  |d OCLCQ  |d W2U  |d DG1  |d BAL  |d KSU  |d COO  |d D6H  |d K6U  |d IDB  |d COCUF  |d DG1  |d CNNOR  |d CCO  |d LIP  |d PIFFA  |d FVL  |d ZCU  |d OCLCQ  |d MERUC  |d OCLCQ  |d NJR  |d U3W  |d OCLCQ  |d STF  |d DEHBZ  |d ICG  |d VT2  |d OCLCQ  |d WYU  |d G3B  |d TKN  |d OCLCQ  |d DKC  |d AU@  |d OCLCQ  |d UKAHL  |d OCLCQ  |d TUHNV  |d OCLCO  |d OCL  |d OCLCQ  |d INARC  |d OCLCO  |d OCLCL 
019 |a 905994359  |a 910165715  |a 926298159  |a 938507249  |a 961646400  |a 962625058  |a 1055397753  |a 1066678352  |a 1081218551  |a 1138978449  |a 1228564303  |a 1244446118  |a 1249250397  |a 1359083501 
020 |a 9781118958490  |q (electronic bk.) 
020 |a 1118958497  |q (electronic bk.) 
020 |a 9781118958483  |q (electronic bk.) 
020 |a 1118958489  |q (electronic bk.) 
020 |a 9781119183624 
020 |a 1119183626 
020 |z 9781118958476 
020 |z 1118958470 
024 8 |a 12350206 
029 1 |a AU@  |b 000055220768 
029 1 |a AU@  |b 000065432688 
029 1 |a AU@  |b 000066758039 
029 1 |a AU@  |b 000067289223 
029 1 |a AU@  |b 000068393963 
029 1 |a CHNEW  |b 000944132 
029 1 |a CHSLU  |b 001221858 
029 1 |a CHVBK  |b 480243638 
029 1 |a DEBBG  |b BV042683513 
029 1 |a DEBBG  |b BV043615820 
029 1 |a DEBBG  |b BV043737974 
029 1 |a DEBSZ  |b 446587184 
029 1 |a DEBSZ  |b 453328806 
029 1 |a DEBSZ  |b 485056844 
029 1 |a GBVCP  |b 823554597 
035 |a (OCoLC)905490497  |z (OCoLC)905994359  |z (OCoLC)910165715  |z (OCoLC)926298159  |z (OCoLC)938507249  |z (OCoLC)961646400  |z (OCoLC)962625058  |z (OCoLC)1055397753  |z (OCoLC)1066678352  |z (OCoLC)1081218551  |z (OCoLC)1138978449  |z (OCoLC)1228564303  |z (OCoLC)1244446118  |z (OCoLC)1249250397  |z (OCoLC)1359083501 
037 |a CL0500000595  |b Safari Books Online 
037 |a 40BE1AD8-74C7-49B9-88D2-38870F93202D  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a HV6773.15.P45  |b H33 2015eb 
072 7 |a SOC  |x 004000  |2 bisacsh 
082 0 4 |a 364.1632  |2 23 
049 |a UAMI 
100 1 |a Hadnagy, Christopher,  |e author. 
245 1 0 |a Phishing dark waters :  |b the offensive and defensive sides of malicious emails /  |c Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke. 
264 1 |a Indianapolis, IN :  |b Wiley,  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource :  |b color illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a An Introduction to the Wild World of Phishing -- The Psychological Principles of Decision-Making -- Influence and Manipulation -- Lessons in Protection -- Plan Your Phishing Trip: Creating the Enterprise Phishing Program -- The Good, the Bad, and the Ugly: Policies and More -- The Professional Phisher's Tackle Bag -- Phish Like a Boss. 
520 |a "An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program. Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer. Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay. Learn what a phish is, and the deceptive ways they've been used Understand decision-making, and the sneaky ways phishers reel you in Recognize different types of phish, and know what to do when you catch one Use phishing as part of your security awareness program for heightened protection Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. Phishing Dark Waters is an indispensable guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe"--Publisher's description 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Phishing. 
650 0 |a Electronic mail messages. 
650 0 |a Electronic mail systems. 
650 6 |a Hameçonnage. 
650 6 |a Courrier électronique. 
650 7 |a electronic mail.  |2 aat 
650 7 |a SOCIAL SCIENCE  |x Criminology.  |2 bisacsh 
650 7 |a Electronic mail systems  |2 fast 
650 7 |a Electronic mail messages  |2 fast 
650 7 |a Phishing  |2 fast 
700 1 |a Fincher, Michele,  |e author. 
700 1 |a Dreeke, Robin,  |e writer of supplementary textual content. 
758 |i has work:  |a Phishing dark waters (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFD3cGPqP7WTTQ4bw67Rw3  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Hadnagy, Christopher.  |t Phishing Dark Waters : The Offensive and Defensive Sides of Malicious Emails  |z 9781118958476  |w (OCoLC)904332085 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1895166  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH27108477 
938 |a Askews and Holts Library Services  |b ASKH  |n AH27113042 
938 |a Coutts Information Services  |b COUT  |n 29743281 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL1895166 
938 |a ebrary  |b EBRY  |n ebr11034356 
938 |a EBSCOhost  |b EBSC  |n 969390 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis29819396 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00612018 
938 |a YBP Library Services  |b YANK  |n 12350206 
938 |a YBP Library Services  |b YANK  |n 12673756 
938 |a YBP Library Services  |b YANK  |n 12767026 
938 |a Internet Archive  |b INAR  |n phishingdarkwate0000hadn_t3f5 
994 |a 92  |b IZTAP