Phishing dark waters: the offensive and defensive sides of malicious E-mails

Machine generated contents note: ch. 1 An Introduction to the Wild World of Phishing -- Phishing 101 -- How People Phish -- Examples -- High-Profile Breaches -- Phish in Their Natural Habitat -- Phish with Bigger Teeth -- Spear Phishing -- Summary -- ch. 2 The Psychological Principles of Decision-Ma...

Full description

Saved in:  
Bibliographic Details
Main Author: Hadnagy, Christopher (Author)
Contributors: Fincher, Michele ; Dreeke, Robin
Format: Print Book
Language:English
Published: Indianapolis, IN Wiley [2015]
In:Year: 2015
Online Access: Autorenbiografie (Verlag)
Contents
Inhaltsverzeichnis (Verlag)
Verlagsangaben (Verlag)
Check availability: HBZ Gateway
Subito Delivery Service: Order now.
Keywords:
Related Items:Erscheint auch als: 1657112616

MARC

LEADER 00000cam a2200000 4500
001 1619032759
003 DE-627
005 20240420131804.0
007 tu
008 160318s2015 gw ||||| 00| ||eng c
020 |a 9781118958476  |c Broschur : ca. EUR 32.90 (DE) (freier Pr.), ca. sfr 44.90 (freier Pr.)  |9 978-1-118-95847-6 
024 3 |a 9781118958476 
024 8 |a Best.-Nr.  |q Best.-Nr. 
035 |a (DE-627)1619032759 
035 |a (DE-576)462253112 
035 |a (DE-599)BSZ462253112 
035 |a (OCoLC)912212058 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
044 |c XA-DE  |c XD-US 
050 0 |a HV6773.15.P45 
082 0 4 |a 004  |q DNB 
084 |a ST 277  |q BVB  |2 rvk  |0 (DE-625)rvk/143643: 
100 1 |a Hadnagy, Christopher  |e VerfasserIn  |0 (DE-588)143224042  |0 (DE-627)671504584  |0 (DE-576)352430508  |4 aut 
109 |a Hadnagy, Christopher 
245 1 0 |a Phishing dark waters  |b the offensive and defensive sides of malicious E-mails  |c Christopher Hadnagy, Michele Fincher 
264 1 |a Indianapolis, IN  |b Wiley  |c [2015] 
264 4 |c © 2015 
300 |a xxxii, 192 Seiten  |b Illustrationen 
336 |a Text  |b txt  |2 rdacontent 
337 |a ohne Hilfsmittel zu benutzen  |b n  |2 rdamedia 
338 |a Band  |b nc  |2 rdacarrier 
505 8 0 |a Machine generated contents note: ch. 1 An Introduction to the Wild World of PhishingPhishing 101 -- How People Phish -- Examples -- High-Profile Breaches -- Phish in Their Natural Habitat -- Phish with Bigger Teeth -- Spear Phishing -- Summary -- ch. 2 The Psychological Principles of Decision-Making -- Decision-Making: Small Bits -- Cognitive Bias -- Physiological States -- External Factors -- The Bottom Line About Decision-Making -- It Seemed Like a Good Idea at the Time -- How Phishers Bait the Hook -- Introducing the Amygdala -- The Guild of Hijacked Amygdalas -- Putting a Leash on the Amygdala -- Wash, Rinse, Repeat -- Summary -- ch. 3 Influence and Manipulation -- Why the Difference Matters to Us -- How Do I Tell the Difference? -- How Will We Build Rapport with Our Targets? -- How Will Our Targets Feel After They Discover They've Been Tested? -- What Is Our Intent? -- But the Bad Guys Will Use Manipulation ... -- Lies, All Lies -- P Is for Punishment 
520 |a Machine generated contents note: ch. 1 An Introduction to the Wild World of Phishing -- Phishing 101 -- How People Phish -- Examples -- High-Profile Breaches -- Phish in Their Natural Habitat -- Phish with Bigger Teeth -- Spear Phishing -- Summary -- ch. 2 The Psychological Principles of Decision-Making -- Decision-Making: Small Bits -- Cognitive Bias -- Physiological States -- External Factors -- The Bottom Line About Decision-Making -- It Seemed Like a Good Idea at the Time -- How Phishers Bait the Hook -- Introducing the Amygdala -- The Guild of Hijacked Amygdalas -- Putting a Leash on the Amygdala -- Wash, Rinse, Repeat -- Summary -- ch. 3 Influence and Manipulation -- Why the Difference Matters to Us -- How Do I Tell the Difference? -- How Will We Build Rapport with Our Targets? -- How Will Our Targets Feel After They Discover They've Been Tested? -- What Is Our Intent? -- But the Bad Guys Will Use Manipulation ... -- Lies, All Lies -- P Is for Punishment -- 
650 0 |a Phishing 
650 0 |a Electronic mail messages 
689 0 0 |d s  |0 (DE-588)7515821-8  |0 (DE-627)508283000  |0 (DE-576)216980224  |a Phishing  |2 gnd 
689 0 |5 DE-101 
700 1 |a Fincher, Michele  |e VerfasserIn  |4 aut 
700 1 |a Dreeke, Robin  |e VerfasserIn  |4 aut 
776 1 |z 9781118958490 
776 1 |z 9781118958483 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |a Hadnagy, Christopher  |t Phishing dark waters  |d Indianapolis, IN : Wiley, 2015  |h 1 Online Ressource (xxxii, 192 Seiten)  |w (DE-627)1657112616  |w (DE-576)512625816  |z 9781118958490  |z 1118958497  |z 9781118958483  |z 1118958489  |z 9781119183624  |z 1119183626 
856 4 2 |u http://deposit.d-nb.de/cgi-bin/dokserv?id=5249900&prov=M&dok_var=1&dok_ext=htm  |m X:MVB  |q text/html  |3 Inhaltstext 
856 4 2 |u https://swbplus.bsz-bw.de/bsz462253112inh.htm  |m B:DE-576;DE-Frei85  |q application/pdf  |v 20160602115853  |x Verlag  |3 Inhaltsverzeichnis 
856 4 2 |u http://www.loc.gov/catdir/enhancements/fy1603/2015933609-b.html  |v 2015-10-28  |x Verlag  |3 Autorenbiografie 
856 4 2 |u http://www.loc.gov/catdir/enhancements/fy1606/2015933609-d.html  |v 2016-03-17  |x Verlag  |3 Verlagsangaben 
889 |w (DE-627)826054129 
935 |a mkri 
935 |i mdedup 
936 r v |a ST 277  |b Sonstiges zur Sicherheit in der Datenverarbeitung  |k Informatik  |k Monografien  |k Software und -entwicklung  |k Sonstiges zur Sicherheit in der Datenverarbeitung  |0 (DE-627)1271118971  |0 (DE-625)rvk/143643:  |0 (DE-576)201118971 
951 |a BO 
ELC |b 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 3221430213 
LOK |0 003 DE-627 
LOK |0 004 1619032759 
LOK |0 005 20160530152459 
LOK |0 008 160318||||||||||||||||ger||||||| 
LOK |0 040   |a DE-Frei85  |c DE-627  |d DE-Frei85 
LOK |0 852   |a DE-Frei85 
LOK |0 852 1  |m p  |9 00 
LOK |0 938   |k p 
ORI |a WA-MARC-krimdoka001.raw