000 05751cam a2200841Ii 4500
001 sulb-eb0033797
003 BD-SySUS
005 20170713221418.0
006 m o d
007 cr cnu---unuuu
008 150323t20152015inua ob 001 0 eng d
040 _aN$T
_beng
_erda
_epn
_cN$T
_dN$T
_dBAL
_dCDX
_dIDEBK
_dE7B
_dYDXCP
_dOCLCF
_dEBLCP
_dBAB
_dRECBK
_dUMI
_dDEBBG
_dTEFOD
_dDEBSZ
_dOCLCQ
_dW2U
_dDG1
_dBAL
_dKSU
_dCOO
_dD6H
_dK6U
_dBD-SySUS
019 _a905994359
_a910165715
_a926298159
_a938507249
_a961646400
_a962625058
020 _a9781118958490
_qelectronic bk.
020 _a1118958497
_qelectronic bk.
020 _a9781118958483
_qelectronic bk.
020 _a1118958489
_qelectronic bk.
020 _z9781118958476
020 _z1118958470
020 _a9781119183624
020 _a1119183626
024 8 _a12350206
029 1 _aDEBBG
_bBV042683513
029 1 _aDEBSZ
_b446587184
029 1 _aCHSLU
_b001221858
029 1 _aDEBSZ
_b453328806
029 1 _aGBVCP
_b823554597
029 1 _aDEBBG
_bBV043615820
029 1 _aDEBBG
_bBV043737974
035 _a(OCoLC)905490497
_z(OCoLC)905994359
_z(OCoLC)910165715
_z(OCoLC)926298159
_z(OCoLC)938507249
_z(OCoLC)961646400
_z(OCoLC)962625058
037 _aCL0500000595
_bSafari Books Online
037 _a40BE1AD8-74C7-49B9-88D2-38870F93202D
_bOverDrive, Inc.
_nhttp://www.overdrive.com
050 4 _aHV6773.15.P45
_bH33 2015eb
072 7 _aSOC
_x004000
_2bisacsh
082 0 4 _a364.1632
_223
049 _aMAIN
100 1 _aHadnagy, Christopher,
_eauthor.
245 1 0 _aPhishing dark waters : the offensive and defensive sides of malicious emails /
_cChristopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke.
264 1 _aIndianapolis, IN :
_bWiley,
_c[2015]
264 4 _c©2015
300 _a1 online resource :
_bcolor illustrations.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
504 _aIncludes bibliographical references and index.
588 0 _aPrint version record.
505 0 _aAn Introduction to the Wild World of Phishing -- The Psychological Principles of Decision-Making -- Influence and Manipulation -- Lessons in Protection -- Plan Your Phishing Trip: Creating the Enterprise Phishing Program -- The Good, the Bad, and the Ugly: Policies and More -- The Professional Phisher's Tackle Bag -- Phish Like a Boss.
520 _a"An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program. Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer. Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay. Learn what a phish is, and the deceptive ways they've been used Understand decision-making, and the sneaky ways phishers reel you in Recognize different types of phish, and know what to do when you catch one Use phishing as part of your security awareness program for heightened protection Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. Phishing Dark Waters is an indispensable guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe"--publisher's description.
650 0 _aPhishing.
650 0 _aElectronic mail messages.
650 7 _aSOCIAL SCIENCE / Criminology
_2bisacsh
650 7 _aElectronic mail messages.
_2fast
_0(OCoLC)fst00907328
650 7 _aPhishing.
_2fast
_0(OCoLC)fst01737436
650 4 _aComputer crimes.
650 4 _aComputer security.
650 4 _aHackers.
650 4 _aSocial engineering.
655 4 _aElectronic books.
700 1 _aFincher, Michele,
_eauthor.
700 1 _aDreeke, Robin,
_ewriter of supplementary textual content.
776 0 8 _iPrint version:
_aHadnagy, Christopher.
_tPhishing Dark Waters : The Offensive and Defensive Sides of Malicious Emails
_z9781118958476
_w(OCoLC)904332085
856 4 0 _uhttp://onlinelibrary.wiley.com/book/10.1002/9781119183624
_zWiley Online Library [Free Download only for SUST IP]
938 _aEBSCOhost
_bEBSC
_n969390
938 _aCoutts Information Services
_bCOUT
_n29743281
938 _aIngram Digital eBook Collection
_bIDEB
_ncis29819396
938 _aebrary
_bEBRY
_nebr11034356
938 _aYBP Library Services
_bYANK
_n12350206
938 _aEBL - Ebook Library
_bEBLB
_nEBL1895166
938 _aRecorded Books, LLC
_bRECE
_nrbeEB00612018
938 _aYBP Library Services
_bYANK
_n12673756
938 _aYBP Library Services
_bYANK
_n12767026
994 _a92
_bDG1
999 _c65449
_d65449