Phishing dark waters: the offensive and defensive sides of malicious E-mails
Machine generated contents note: ch. 1 An Introduction to the Wild World of Phishing -- Phishing 101 -- How People Phish -- Examples -- High-Profile Breaches -- Phish in Their Natural Habitat -- Phish with Bigger Teeth -- Spear Phishing -- Summary -- ch. 2 The Psychological Principles of Decision-Ma...
Authors: | ; ; |
---|---|
Format: | Print Book |
Language: | English |
Published: |
Indianapolis, IN
Wiley
[2015]
|
In: | Year: 2015 |
Online Access: |
Autorenbiografie (Verlag) Contents Inhaltsverzeichnis (Verlag) Verlagsangaben (Verlag) |
Check availability: | HBZ Gateway |
Subito Delivery Service: | Order now. |
Keywords: | |
Related Items: | Erscheint auch als:
1657112616 |
MARC
LEADER | 00000cam a2200000 4500 | ||
---|---|---|---|
001 | 1619032759 | ||
003 | DE-627 | ||
005 | 20240820163244.0 | ||
007 | tu | ||
008 | 160318s2015 gw ||||| 00| ||eng c | ||
020 | |a 9781118958476 |c Broschur : ca. EUR 32.90 (DE) (freier Pr.), ca. sfr 44.90 (freier Pr.) |9 978-1-118-95847-6 | ||
024 | 3 | |a 9781118958476 | |
024 | 8 | |a Best.-Nr. |q Best.-Nr. | |
035 | |a (DE-627)1619032759 | ||
035 | |a (DE-576)462253112 | ||
035 | |a (DE-599)BSZ462253112 | ||
035 | |a (OCoLC)912212058 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
044 | |c XA-DE |c XD-US | ||
050 | 0 | |a HV6773.15.P45 | |
082 | 0 | |a 364.1632 |q SEPA | |
082 | 0 | 4 | |a 004 |q DNB |
084 | |a ST 277 |q BVB |2 rvk |0 (DE-625)rvk/143643: | ||
100 | 1 | |a Hadnagy, Christopher |e VerfasserIn |0 (DE-588)143224042 |0 (DE-627)671504584 |0 (DE-576)352430508 |4 aut | |
109 | |a Hadnagy, Christopher | ||
245 | 1 | 0 | |a Phishing dark waters |b the offensive and defensive sides of malicious E-mails |c Christopher Hadnagy, Michele Fincher |
264 | 1 | |a Indianapolis, IN |b Wiley |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a xxxii, 192 Seiten |b Illustrationen | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
505 | 8 | 0 | |a Machine generated contents note: ch. 1 An Introduction to the Wild World of PhishingPhishing 101 -- How People Phish -- Examples -- High-Profile Breaches -- Phish in Their Natural Habitat -- Phish with Bigger Teeth -- Spear Phishing -- Summary -- ch. 2 The Psychological Principles of Decision-Making -- Decision-Making: Small Bits -- Cognitive Bias -- Physiological States -- External Factors -- The Bottom Line About Decision-Making -- It Seemed Like a Good Idea at the Time -- How Phishers Bait the Hook -- Introducing the Amygdala -- The Guild of Hijacked Amygdalas -- Putting a Leash on the Amygdala -- Wash, Rinse, Repeat -- Summary -- ch. 3 Influence and Manipulation -- Why the Difference Matters to Us -- How Do I Tell the Difference? -- How Will We Build Rapport with Our Targets? -- How Will Our Targets Feel After They Discover They've Been Tested? -- What Is Our Intent? -- But the Bad Guys Will Use Manipulation ... -- Lies, All Lies -- P Is for Punishment |
520 | |a Machine generated contents note: ch. 1 An Introduction to the Wild World of Phishing -- Phishing 101 -- How People Phish -- Examples -- High-Profile Breaches -- Phish in Their Natural Habitat -- Phish with Bigger Teeth -- Spear Phishing -- Summary -- ch. 2 The Psychological Principles of Decision-Making -- Decision-Making: Small Bits -- Cognitive Bias -- Physiological States -- External Factors -- The Bottom Line About Decision-Making -- It Seemed Like a Good Idea at the Time -- How Phishers Bait the Hook -- Introducing the Amygdala -- The Guild of Hijacked Amygdalas -- Putting a Leash on the Amygdala -- Wash, Rinse, Repeat -- Summary -- ch. 3 Influence and Manipulation -- Why the Difference Matters to Us -- How Do I Tell the Difference? -- How Will We Build Rapport with Our Targets? -- How Will Our Targets Feel After They Discover They've Been Tested? -- What Is Our Intent? -- But the Bad Guys Will Use Manipulation ... -- Lies, All Lies -- P Is for Punishment -- | ||
650 | 0 | |a Phishing | |
650 | 0 | |a Electronic mail messages | |
689 | 0 | 0 | |d s |0 (DE-588)7515821-8 |0 (DE-627)508283000 |0 (DE-576)216980224 |a Phishing |2 gnd |
689 | 0 | |5 DE-101 | |
700 | 1 | |a Fincher, Michele |e VerfasserIn |4 aut | |
700 | 1 | |a Dreeke, Robin |e VerfasserIn |4 aut | |
776 | 1 | |z 9781118958490 | |
776 | 1 | |z 9781118958483 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |a Hadnagy, Christopher |t Phishing dark waters |d Indianapolis, IN : Wiley, 2015 |h 1 Online Ressource (xxxii, 192 Seiten) |w (DE-627)1657112616 |w (DE-576)512625816 |z 9781118958490 |z 1118958497 |z 9781118958483 |z 1118958489 |z 9781119183624 |z 1119183626 |
856 | 4 | 2 | |u http://deposit.d-nb.de/cgi-bin/dokserv?id=5249900&prov=M&dok_var=1&dok_ext=htm |m X:MVB |q text/html |3 Inhaltstext |
856 | 4 | 2 | |u https://swbplus.bsz-bw.de/bsz462253112inh.htm |m B:DE-576;DE-Frei85 |q application/pdf |v 20160602115853 |x Verlag |3 Inhaltsverzeichnis |
856 | 4 | 2 | |u http://www.loc.gov/catdir/enhancements/fy1603/2015933609-b.html |v 2015-10-28 |x Verlag |3 Autorenbiografie |
856 | 4 | 2 | |u http://www.loc.gov/catdir/enhancements/fy1606/2015933609-d.html |v 2016-03-17 |x Verlag |3 Verlagsangaben |
889 | |w (DE-627)826054129 | ||
935 | |a mkri | ||
935 | |i mdedup | ||
936 | r | v | |a ST 277 |b Sonstiges zur Sicherheit in der Datenverarbeitung |k Informatik |k Monografien |k Software und -entwicklung |k Sonstiges zur Sicherheit in der Datenverarbeitung |0 (DE-627)1271118971 |0 (DE-625)rvk/143643: |0 (DE-576)201118971 |
951 | |a BO | ||
ELC | |b 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 3221430213 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1619032759 | ||
LOK | |0 005 20160530152459 | ||
LOK | |0 008 160318||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-Frei85 |c DE-627 |d DE-Frei85 | ||
LOK | |0 852 |a DE-Frei85 | ||
LOK | |0 852 1 |m p |9 00 | ||
LOK | |0 938 |k p | ||
ORI | |a WA-MARC-krimdoka001.raw |