Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.
The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication.
Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon’s 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack.This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations fromphishing attacks.
What You Will Learn
Who This Book Is For
Security professionals who need to educate online users, especially those who deal with banks, online stores, payment systems, governments organizations, social networks and blogs, IT companies, telecommunications companies, and others. Thesecondary audience includes researchers working to develop novel strategies to fight against phishing activities and undergraduate and graduate instructors of cybersecurity.Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Dr. Gunikhan Sonowal is an Assistant Professor in the Department of Computer Science and Engineering at KL University. His research interests include information security (phishing) and accessibility computing. He received his Bachelor of Science degree (BSc) from Sibsagar College, a Master of Computer Application (MCA) at University of Hyderabad, India, and a PhD in computer science and engineering from Pondicherry University. He has published eight research papers in peer-reviewed journals and international conferences.
<p>Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.</p><p>The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication.</p>Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon’s 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack.<p></p><p>This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations from phishing attacks.</p><p>What You Will Learn<br></p><p></p><ul><li>Understand various forms of phishing attacks, including deceptive, DNS-based, search engine, and contents injection phishing</li><li>Know which communications are most commonly used, including email, SMS, voice, blog, wifi, and more</li><li>Be familiar with phishing kits (what they are) and how security experts utilize them to improve user awareness</li><li>Be aware of the techniques that attackers most commonly use to request information</li><li>Master the best solutions (including educational, legal, technical) to protect against phishing attacks</li></ul><p></p><p></p><p></p><p></p><p></p><p><br></p>
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 17,08 für den Versand von USA nach Deutschland
Versandziele, Kosten & DauerEUR 2,29 für den Versand von Vereinigtes Königreich nach Deutschland
Versandziele, Kosten & DauerAnbieter: Rarewaves.com UK, London, Vereinigtes Königreich
Paperback. Zustand: New. 1st ed. Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication. Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon's 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack.This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations fromphishing attacks.What You Will LearnUnderstand various forms of phishing attacks, including deceptive, DNS-based, search engine, and contents injection phishingKnow which communications are most commonly used, including email, SMS, voice, blog, wifi, and moreBe familiar with phishing kits (what they are) and how security experts utilize them to improve user awarenessBe aware of the techniques that attackers most commonly use to request informationMaster the best solutions (including educational, legal, technical) to protect against phishing attacksWho This Book Is ForSecurity professionals who need to educate online users, especially those who deal with banks, online stores, payment systems, governments organizations, social networks and blogs, IT companies, telecommunications companies, and others. Thesecondary audience includes researchers working to develop novel strategies to fight against phishing activities and undergraduate and graduate instructors of cybersecurity. Bestandsnummer des Verkäufers LU-9781484277430
Anzahl: 1 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. Intermediate user levelMitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.The aim . Bestandsnummer des Verkäufers 501191687
Anzahl: 1 verfügbar
Anbieter: THE SAINT BOOKSTORE, Southport, Vereinigtes Königreich
Paperback / softback. Zustand: New. New copy - Usually dispatched within 2 working days. 209. Bestandsnummer des Verkäufers B9781484277430
Anzahl: 1 verfügbar
Anbieter: Rarewaves.com USA, London, LONDO, Vereinigtes Königreich
Paperback. Zustand: New. 1st ed. Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication. Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon's 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack.This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations fromphishing attacks.What You Will LearnUnderstand various forms of phishing attacks, including deceptive, DNS-based, search engine, and contents injection phishingKnow which communications are most commonly used, including email, SMS, voice, blog, wifi, and moreBe familiar with phishing kits (what they are) and how security experts utilize them to improve user awarenessBe aware of the techniques that attackers most commonly use to request informationMaster the best solutions (including educational, legal, technical) to protect against phishing attacksWho This Book Is ForSecurity professionals who need to educate online users, especially those who deal with banks, online stores, payment systems, governments organizations, social networks and blogs, IT companies, telecommunications companies, and others. Thesecondary audience includes researchers working to develop novel strategies to fight against phishing activities and undergraduate and graduate instructors of cybersecurity. Bestandsnummer des Verkäufers LU-9781484277430
Anzahl: 1 verfügbar
Anbieter: California Books, Miami, FL, USA
Zustand: New. Bestandsnummer des Verkäufers I-9781484277430
Anzahl: Mehr als 20 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering. Bestandsnummer des Verkäufers 9781484277430
Anzahl: 1 verfügbar
Anbieter: Brook Bookstore, Milano, MI, Italien
Zustand: new. Bestandsnummer des Verkäufers KXAMSBX7CI
Anzahl: 10 verfügbar
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
PAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000. Bestandsnummer des Verkäufers S0-9781484277430
Anzahl: 10 verfügbar
Anbieter: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irland
Zustand: New. 2021. Paperback. . . . . . Bestandsnummer des Verkäufers V9781484277430
Anzahl: 15 verfügbar
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Bestandsnummer des Verkäufers ria9781484277430_new
Anzahl: Mehr als 20 verfügbar