語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
How to catch a phish = a practical g...
~
Oles, Nicholas.
FindBook
Google Book
Amazon
博客來
How to catch a phish = a practical guide to detecting phishing emails /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
How to catch a phish/ by Nicholas Oles.
其他題名:
a practical guide to detecting phishing emails /
作者:
Oles, Nicholas.
出版者:
Berkeley, CA :Apress : : 2023.,
面頁冊數:
xi, 147 p. :ill., digital ;24 cm.
內容註:
Chapter 1. How Email Works -- Chapter 2. Phishing Tactics and Techniques -- Chapter 3. PICERL Process explained -- Chapter 4. Analyzing Message Content -- Chapter 5. Links -- Chapter 6. Attachments -- Chapter 7. Log Searching and Response -- Chapter 8. Remediation and Lessons Learned.
Contained By:
Springer Nature eBook
標題:
Phishing - Prevention. -
電子資源:
https://doi.org/10.1007/978-1-4842-9361-4
ISBN:
9781484293614
How to catch a phish = a practical guide to detecting phishing emails /
Oles, Nicholas.
How to catch a phish
a practical guide to detecting phishing emails /[electronic resource] :by Nicholas Oles. - Berkeley, CA :Apress :2023. - xi, 147 p. :ill., digital ;24 cm.
Chapter 1. How Email Works -- Chapter 2. Phishing Tactics and Techniques -- Chapter 3. PICERL Process explained -- Chapter 4. Analyzing Message Content -- Chapter 5. Links -- Chapter 6. Attachments -- Chapter 7. Log Searching and Response -- Chapter 8. Remediation and Lessons Learned.
Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization and individual with an email account is susceptible to deceptive emails sent by attackers with nefarious intentions. This activity, known as phishing, involves an attacker attempting to lure individuals into providing sensitive information or performing a predetermined action. Attacks vary in sophistication, but the core skills and process to detect, analyze, and respond to a suspicious message does not change. Attackers have preyed on victims with convincing and not-so-convincing phishing emails to gain initial footholds into networks around the world for over 30 years. This attack method has been rapidly growing in popularity and continues to be the number one method that organizations and individuals struggle to defend against. Regardless of what any vendor or organization will tell you, no infallible tool exists to eliminate this threat completely. This book teaches you how to analyze suspicious messages using free tools and resources. You will understand the basics of email, tactics used by attackers, and a repeatable process to systematically analyze messages and respond to suspicious activity. You Will Learn How to: Safely save email messages as attachments for analysis Identify what information is in an email header Review header information and extract key indicators or patterns used for detection Identify signs of a suspicious or malicious email message Detect the tactics that attackers use in phishing emails Safely examine email links and attachments Use a variety of free and simple tools to analyze email messages.
ISBN: 9781484293614
Standard No.: 10.1007/978-1-4842-9361-4doiSubjects--Topical Terms:
3593842
Phishing
--Prevention.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.82
How to catch a phish = a practical guide to detecting phishing emails /
LDR
:03191nmm a2200349 a 4500
001
2332476
003
DE-He213
005
20230620110640.0
006
m d
007
cr nn 008maaau
008
240402s2023 cau s 0 eng d
020
$a
9781484293614
$q
(electronic bk.)
020
$a
9781484293607
$q
(paper)
024
7
$a
10.1007/978-1-4842-9361-4
$2
doi
035
$a
978-1-4842-9361-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.82
$2
23
090
$a
QA76.9.A25
$b
O45 2023
100
1
$a
Oles, Nicholas.
$3
3662395
245
1 0
$a
How to catch a phish
$h
[electronic resource] :
$b
a practical guide to detecting phishing emails /
$c
by Nicholas Oles.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2023.
300
$a
xi, 147 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1. How Email Works -- Chapter 2. Phishing Tactics and Techniques -- Chapter 3. PICERL Process explained -- Chapter 4. Analyzing Message Content -- Chapter 5. Links -- Chapter 6. Attachments -- Chapter 7. Log Searching and Response -- Chapter 8. Remediation and Lessons Learned.
520
$a
Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization and individual with an email account is susceptible to deceptive emails sent by attackers with nefarious intentions. This activity, known as phishing, involves an attacker attempting to lure individuals into providing sensitive information or performing a predetermined action. Attacks vary in sophistication, but the core skills and process to detect, analyze, and respond to a suspicious message does not change. Attackers have preyed on victims with convincing and not-so-convincing phishing emails to gain initial footholds into networks around the world for over 30 years. This attack method has been rapidly growing in popularity and continues to be the number one method that organizations and individuals struggle to defend against. Regardless of what any vendor or organization will tell you, no infallible tool exists to eliminate this threat completely. This book teaches you how to analyze suspicious messages using free tools and resources. You will understand the basics of email, tactics used by attackers, and a repeatable process to systematically analyze messages and respond to suspicious activity. You Will Learn How to: Safely save email messages as attachments for analysis Identify what information is in an email header Review header information and extract key indicators or patterns used for detection Identify signs of a suspicious or malicious email message Detect the tactics that attackers use in phishing emails Safely examine email links and attachments Use a variety of free and simple tools to analyze email messages.
650
0
$a
Phishing
$x
Prevention.
$3
3593842
650
0
$a
Electronic mail messages
$x
Security measures.
$3
1638817
650
1 4
$a
Data and Information Security.
$3
3538510
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-9361-4
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9458681
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入