語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Phishing and communication channels ...
~
Sonowal, Gunikhan.
FindBook
Google Book
Amazon
博客來
Phishing and communication channels = a guide to identifying and mitigating phishing attacks /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Phishing and communication channels/ by Gunikhan Sonowal.
其他題名:
a guide to identifying and mitigating phishing attacks /
作者:
Sonowal, Gunikhan.
出版者:
Berkeley, CA :Apress : : 2022.,
面頁冊數:
xvii, 220 p. :ill., digital ;24 cm.
內容註:
1: Introduction to Phishing -- 2: Types of Phishing -- 3: Communication Channels -- 4: What Does a Phishing URL Look Like? -- 5: Characteristics of a Phishing Website -- 6: Phishing Kits -- 7: Training Methods for Phishing Detection -- 8: Legal Solution: Phishing is Prohibited Under a Number of Laws -- 9: Phishing Detection Based on Technology -- Appendix A: Machine Learning Algorithms -- Appendix B: Deep Learning Algorithms -- Appendix C: Natural Language Processing (NLP) -- Appendix D: Evaluation Metrics for Phishing Detection Approaches.
Contained By:
Springer Nature eBook
標題:
Phishing - Prevention. -
電子資源:
https://doi.org/10.1007/978-1-4842-7744-7
ISBN:
9781484277447
Phishing and communication channels = a guide to identifying and mitigating phishing attacks /
Sonowal, Gunikhan.
Phishing and communication channels
a guide to identifying and mitigating phishing attacks /[electronic resource] :by Gunikhan Sonowal. - Berkeley, CA :Apress :2022. - xvii, 220 p. :ill., digital ;24 cm.
1: Introduction to Phishing -- 2: Types of Phishing -- 3: Communication Channels -- 4: What Does a Phishing URL Look Like? -- 5: Characteristics of a Phishing Website -- 6: Phishing Kits -- 7: Training Methods for Phishing Detection -- 8: Legal Solution: Phishing is Prohibited Under a Number of Laws -- 9: Phishing Detection Based on Technology -- Appendix A: Machine Learning Algorithms -- Appendix B: Deep Learning Algorithms -- Appendix C: Natural Language Processing (NLP) -- Appendix D: Evaluation Metrics for Phishing Detection Approaches.
Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels. The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication. Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon's 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack. This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations from phishing attacks. What You Will Learn Understand various forms of phishing attacks, including deceptive, DNS-based, search engine, and contents injection phishing Know which communications are most commonly used, including email, SMS, voice, blog, wifi, and more Be familiar with phishing kits (what they are) and how security experts utilize them to improve user awareness Be aware of the techniques that attackers most commonly use to request information Master the best solutions (including educational, legal, technical) to protect against phishing attacks.
ISBN: 9781484277447
Standard No.: 10.1007/978-1-4842-7744-7doiSubjects--Topical Terms:
3593842
Phishing
--Prevention.
LC Class. No.: HV6773 / .S65 2022
Dewey Class. No.: 364.1632
Phishing and communication channels = a guide to identifying and mitigating phishing attacks /
LDR
:03175nmm a2200349 a 4500
001
2297854
003
DE-He213
005
20220124160548.0
006
m d
007
cr nn 008maaau
008
230324s2022 cau s 0 eng d
020
$a
9781484277447
$q
(electronic bk.)
020
$a
9781484277430
$q
(paper)
024
7
$a
10.1007/978-1-4842-7744-7
$2
doi
035
$a
978-1-4842-7744-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
HV6773
$b
.S65 2022
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
364.1632
$2
23
090
$a
HV6773
$b
.S699 2022
100
1
$a
Sonowal, Gunikhan.
$3
3593841
245
1 0
$a
Phishing and communication channels
$h
[electronic resource] :
$b
a guide to identifying and mitigating phishing attacks /
$c
by Gunikhan Sonowal.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2022.
300
$a
xvii, 220 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
1: Introduction to Phishing -- 2: Types of Phishing -- 3: Communication Channels -- 4: What Does a Phishing URL Look Like? -- 5: Characteristics of a Phishing Website -- 6: Phishing Kits -- 7: Training Methods for Phishing Detection -- 8: Legal Solution: Phishing is Prohibited Under a Number of Laws -- 9: Phishing Detection Based on Technology -- Appendix A: Machine Learning Algorithms -- Appendix B: Deep Learning Algorithms -- Appendix C: Natural Language Processing (NLP) -- Appendix D: Evaluation Metrics for Phishing Detection Approaches.
520
$a
Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels. The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication. Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon's 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack. This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations from phishing attacks. What You Will Learn Understand various forms of phishing attacks, including deceptive, DNS-based, search engine, and contents injection phishing Know which communications are most commonly used, including email, SMS, voice, blog, wifi, and more Be familiar with phishing kits (what they are) and how security experts utilize them to improve user awareness Be aware of the techniques that attackers most commonly use to request information Master the best solutions (including educational, legal, technical) to protect against phishing attacks.
650
0
$a
Phishing
$x
Prevention.
$3
3593842
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Data and Information Security.
$3
3538510
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-7744-7
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9439746
電子資源
11.線上閱覽_V
電子書
EB HV6773 .S65 2022
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入