|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
SCIDIR_ocn990144436 |
003 |
OCoLC |
005 |
20231120010202.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
170615s2017 enka ob 001 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e rda
|e pn
|c OPELS
|d OCLCF
|d MERER
|d OCLCQ
|d UAB
|d OTZ
|d OCLCQ
|d OCLCA
|d D6H
|d U3W
|d OCLCQ
|d EBLCP
|d MERUC
|d WYU
|d TEFOD
|d UKAHL
|d OCLCQ
|d S2H
|d OCLCO
|d LVT
|d UX1
|d VT2
|d OCLCO
|d KMS
|d OCLCO
|
019 |
|
|
|a 1066512315
|a 1229579389
|a 1235114985
|a 1235846034
|
020 |
|
|
|a 0124116302
|
020 |
|
|
|a 9780124116306
|
020 |
|
|
|a 9780124116399
|q (electronic bk.)
|
020 |
|
|
|a 0124116396
|q (electronic bk.)
|
024 |
3 |
|
|a 9780124116306
|
035 |
|
|
|a (OCoLC)990144436
|z (OCoLC)1066512315
|z (OCoLC)1229579389
|z (OCoLC)1235114985
|z (OCoLC)1235846034
|
050 |
|
4 |
|a HV8079.C65
|
082 |
0 |
4 |
|a 364.16/8
|2 23
|
100 |
1 |
|
|a Malin, Cameron H.,
|e author.
|
245 |
1 |
0 |
|a Deception in the digital age :
|b exploiting and defending human targets through computer-mediated communications /
|c Cameron H. Malin, Terry Gudaitis, Thomas J. Holt, Max Kilger.
|
264 |
|
1 |
|a London, United Kingdom :
|b Academic Press, an imprint of Elsevier,
|c [2017]
|
300 |
|
|
|a 1 online resource (xxiii, 260 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (ScienceDirect, viewed June 15, 2017).
|
505 |
0 |
|
|a Introduction : Cyberanthropology of Deception -- The Psychology of Deception -- Virtual Myths : Internet Urban Legend, Chain Letters, and Warnings -- Viral Influence : Deceptive Computing Attacks Through Persuasion -- Social Dynamics of Deception : Cyber Underground Markets and Cultures -- Phishing, Watering Holes, and Scareware -- Seeing is Not Believing : Deceptive Internet Video Communications -- Cyber Jihad and Deception : Virtual Enhancement and Shaping of the Terrorist Narrative -- Asymmetric Warfare and Psyops : Nation State-Sponsored Cyber Attacks -- Sweet Deception : Honeypots -- Looking Forward : Deception in the Future.
|
520 |
|
|
|a This book guides readers through the fascinating history and principles of deception - and how these techniques and stratagems are being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory, and narrative bases of misdirection, used to shape the targeted audience's perceptions and beliefs. The text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks - and conversely postmortem insight about attackers - presenting a unique resource that empowers readers to observe, understand, and protect against cyber deception tactics. Written by information security experts with real-world investigative experience, this text provides practical guidance to readers with rich literature references, diagrams, and examples that enhance the learning process.
|
650 |
|
0 |
|a Computer crimes
|x Investigation.
|
650 |
|
0 |
|a Computer crimes
|x Prevention.
|
650 |
|
0 |
|a Deception.
|
650 |
|
6 |
|a Criminalit�e informatique
|x Enqu�etes.
|0 (CaQQLa)201-0278229
|
650 |
|
6 |
|a Tromperie.
|0 (CaQQLa)201-0013837
|
650 |
|
7 |
|a Computer crimes
|x Investigation
|2 fast
|0 (OCoLC)fst00872065
|
650 |
|
7 |
|a Computer crimes
|x Prevention
|2 fast
|0 (OCoLC)fst00872068
|
650 |
|
7 |
|a Deception
|2 fast
|0 (OCoLC)fst00888968
|
700 |
1 |
|
|a Gudaitis, Terry,
|e author.
|
700 |
1 |
|
|a Holt, Thomas J.,
|d 1978-
|e author.
|
700 |
1 |
|
|a Kilger, Max,
|e author.
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780124116306
|z Texto completo
|