Welcome to Central Library, SUST

Phishing dark waters : the offensive and defensive sides of malicious emails / (Record no. 65449)

MARC details
000 -LEADER
fixed length control field 05751cam a2200841Ii 4500
001 - CONTROL NUMBER
control field sulb-eb0033797
003 - CONTROL NUMBER IDENTIFIER
control field BD-SySUS
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20170713221418.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150323t20152015inua ob 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency N$T
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency N$T
Modifying agency N$T
-- BAL
-- CDX
-- IDEBK
-- E7B
-- YDXCP
-- OCLCF
-- EBLCP
-- BAB
-- RECBK
-- UMI
-- DEBBG
-- TEFOD
-- DEBSZ
-- OCLCQ
-- W2U
-- DG1
-- BAL
-- KSU
-- COO
-- D6H
-- K6U
-- BD-SySUS
019 ## -
-- 905994359
-- 910165715
-- 926298159
-- 938507249
-- 961646400
-- 962625058
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118958490
Qualifying information electronic bk.
International Standard Book Number 1118958497
Qualifying information electronic bk.
International Standard Book Number 9781118958483
Qualifying information electronic bk.
International Standard Book Number 1118958489
Qualifying information electronic bk.
Canceled/invalid ISBN 9781118958476
Canceled/invalid ISBN 1118958470
International Standard Book Number 9781119183624
International Standard Book Number 1119183626
024 8# - OTHER STANDARD IDENTIFIER
Standard number or code 12350206
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBBG
System control number BV042683513
OCLC library identifier DEBSZ
System control number 446587184
OCLC library identifier CHSLU
System control number 001221858
OCLC library identifier DEBSZ
System control number 453328806
OCLC library identifier GBVCP
System control number 823554597
OCLC library identifier DEBBG
System control number BV043615820
OCLC library identifier DEBBG
System control number BV043737974
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)905490497
Canceled/invalid control number (OCoLC)905994359
-- (OCoLC)910165715
-- (OCoLC)926298159
-- (OCoLC)938507249
-- (OCoLC)961646400
-- (OCoLC)962625058
037 ## - SOURCE OF ACQUISITION
Stock number CL0500000595
Source of stock number/acquisition Safari Books Online
Stock number 40BE1AD8-74C7-49B9-88D2-38870F93202D
Source of stock number/acquisition OverDrive, Inc.
Note http://www.overdrive.com
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6773.15.P45
Item number H33 2015eb
072 #7 - SUBJECT CATEGORY CODE
Subject category code SOC
Subject category code subdivision 004000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 364.1632
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Hadnagy, Christopher,
Relator term author.
245 10 - TITLE STATEMENT
Title Phishing dark waters : the offensive and defensive sides of malicious emails /
Statement of responsibility, etc. Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Indianapolis, IN :
Name of producer, publisher, distributor, manufacturer Wiley,
Date of production, publication, distribution, manufacture, or copyright notice [2015]
Date of production, publication, distribution, manufacture, or copyright notice ©2015
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource :
Other physical details color illustrations.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Print version record.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note An Introduction to the Wild World of Phishing -- The Psychological Principles of Decision-Making -- Influence and Manipulation -- Lessons in Protection -- Plan Your Phishing Trip: Creating the Enterprise Phishing Program -- The Good, the Bad, and the Ugly: Policies and More -- The Professional Phisher's Tackle Bag -- Phish Like a Boss.
520 ## - SUMMARY, ETC.
Summary, etc. "An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program. Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer. Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay. Learn what a phish is, and the deceptive ways they've been used Understand decision-making, and the sneaky ways phishers reel you in Recognize different types of phish, and know what to do when you catch one Use phishing as part of your security awareness program for heightened protection Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. Phishing Dark Waters is an indispensable guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe"--publisher's description.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Phishing.
Topical term or geographic name as entry element Electronic mail messages.
Topical term or geographic name as entry element SOCIAL SCIENCE / Criminology
Source of heading or term bisacsh
Topical term or geographic name as entry element Electronic mail messages.
Source of heading or term fast
Authority record control number (OCoLC)fst00907328
Topical term or geographic name as entry element Phishing.
Source of heading or term fast
Authority record control number (OCoLC)fst01737436
Topical term or geographic name as entry element Computer crimes.
Topical term or geographic name as entry element Computer security.
Topical term or geographic name as entry element Hackers.
Topical term or geographic name as entry element Social engineering.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Fincher, Michele,
Relator term author.
Personal name Dreeke, Robin,
Relator term writer of supplementary textual content.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Hadnagy, Christopher.
Title Phishing Dark Waters : The Offensive and Defensive Sides of Malicious Emails
International Standard Book Number 9781118958476
Record control number (OCoLC)904332085
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://onlinelibrary.wiley.com/book/10.1002/9781119183624">http://onlinelibrary.wiley.com/book/10.1002/9781119183624</a>
Public note Wiley Online Library [Free Download only for SUST IP]
938 ## -
-- EBSCOhost
-- EBSC
-- 969390
-- Coutts Information Services
-- COUT
-- 29743281
-- Ingram Digital eBook Collection
-- IDEB
-- cis29819396
-- ebrary
-- EBRY
-- ebr11034356
-- YBP Library Services
-- YANK
-- 12350206
-- EBL - Ebook Library
-- EBLB
-- EBL1895166
-- Recorded Books, LLC
-- RECE
-- rbeEB00612018
-- YBP Library Services
-- YANK
-- 12673756
-- YBP Library Services
-- YANK
-- 12767026
994 ## -
-- 92
-- DG1

No items available.