語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Effective strategies for combatting ...
~
Elngar, Ahmed A.
FindBook
Google Book
Amazon
博客來
Effective strategies for combatting social engineering in cybersecurity
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Effective strategies for combatting social engineering in cybersecurity/ Rajeev Kumar, Saurabh Srivastava, Ahmed A. Elngar, editors.
其他作者:
Elngar, Ahmed A.
出版者:
Hershey, Pennsylvania :IGI Global Scientific Publishing, : 2025.,
面頁冊數:
1 online resource (xxi, 428 p.) :ill.
內容註:
Preface -- Chapter 1. Sentiment-Based Summarization of Legal Documents Using Natural Language Processing (NLP) Techniques -- Chapter 2. Exploring Social Engineering Attacks Involving Insights From Case Studies -- Chapter 3. Social Engineering in the Digital Age: A Critical Examination of Attack Techniques, Consequences, and Preventative Measures -- Chapter 4. Cybersecurity in the Age of Social Engineering: Implementing Effective Defense Strategies -- Chapter 5. Exploration of Social Engineering in the Digital Era of Stealth -- Chapter 6. Empowering Cyber Resilience: Effective Strategies for Combating Social Engineering Threats -- Chapter 7. Securing the Weakest Link: Compressive Approaches to Social Engineering Attack Prevention -- Chapter 8. Protecting Against Social Engineering Using Wireshark: Effective Strategies With Real-World Examples -- Chapter 9. Emerging Trends and Future Directions in Social Engineering Defense -- Chapter 10. Exploring the Future Landscape: Emerging Trends in Social Engineering Defense -- Chapter 11. A Comprehensive Guide to Blockchain Technology and Its Role in Enhancing Cyber Security and Combating Social Engineering -- Chapter 12. Social Engineering in Social Media and Online Interactions -- Chapter 13. The Use of Deep Fakes in Social Engineering Attacks: A Case Study on Social Media Engagements -- Chapter 14. The Rising Threat of Deepfake Technology and Frightening Advancementsof Social Engineering -- Chapter 15. Phishing Detection System Using Machine Learning -- Chapter 16. Assortment of Social Engineering Attacks in the New Digital Era -- Compilation of References -- About the Contributors -- Index.
標題:
Social engineering. -
電子資源:
https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-6665-3
ISBN:
9798369366677
Effective strategies for combatting social engineering in cybersecurity
Effective strategies for combatting social engineering in cybersecurity
[electronic resource] /Rajeev Kumar, Saurabh Srivastava, Ahmed A. Elngar, editors. - Hershey, Pennsylvania :IGI Global Scientific Publishing,2025. - 1 online resource (xxi, 428 p.) :ill. - Advances in information security, privacy, and ethics (AISPE) book series. - Advances in information security, privacy, and ethics (AISPE) book series..
Includes bibliographical references and index.
Preface -- Chapter 1. Sentiment-Based Summarization of Legal Documents Using Natural Language Processing (NLP) Techniques -- Chapter 2. Exploring Social Engineering Attacks Involving Insights From Case Studies -- Chapter 3. Social Engineering in the Digital Age: A Critical Examination of Attack Techniques, Consequences, and Preventative Measures -- Chapter 4. Cybersecurity in the Age of Social Engineering: Implementing Effective Defense Strategies -- Chapter 5. Exploration of Social Engineering in the Digital Era of Stealth -- Chapter 6. Empowering Cyber Resilience: Effective Strategies for Combating Social Engineering Threats -- Chapter 7. Securing the Weakest Link: Compressive Approaches to Social Engineering Attack Prevention -- Chapter 8. Protecting Against Social Engineering Using Wireshark: Effective Strategies With Real-World Examples -- Chapter 9. Emerging Trends and Future Directions in Social Engineering Defense -- Chapter 10. Exploring the Future Landscape: Emerging Trends in Social Engineering Defense -- Chapter 11. A Comprehensive Guide to Blockchain Technology and Its Role in Enhancing Cyber Security and Combating Social Engineering -- Chapter 12. Social Engineering in Social Media and Online Interactions -- Chapter 13. The Use of Deep Fakes in Social Engineering Attacks: A Case Study on Social Media Engagements -- Chapter 14. The Rising Threat of Deepfake Technology and Frightening Advancementsof Social Engineering -- Chapter 15. Phishing Detection System Using Machine Learning -- Chapter 16. Assortment of Social Engineering Attacks in the New Digital Era -- Compilation of References -- About the Contributors -- Index.
Effective Strategies for Combatting Social Engineering in Cybersecurity offers a thorough exploration of these challenges, providing a well-rounded approach to understanding and countering social engineering threats. It delves into the theoretical aspects of social engineering, including the psychological principles that drive these attacks, while also offering practical solutions through real-world case studies and applications. By bridging the gap between theory andpractice, the book equips academics, practitioners, and policymakers with actionable strategies to enhance their defenses.
Mode of access: World Wide Web.
ISBN: 9798369366677Subjects--Topical Terms:
631145
Social engineering.
Subjects--Index Terms:
Attack Techniques.Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: HM668 / .E34 2025eb
Dewey Class. No.: 301
Effective strategies for combatting social engineering in cybersecurity
LDR
:03916nmm a2200457 a 4500
001
2415656
006
m o d
007
cr nn |||muauu
008
260207s2025 paua ob 001 0 eng d
020
$a
9798369366677
$q
(ebook)
020
$z
9798369366653
$q
(hardback)
035
$a
(CaBNVSL)slc00007279
035
$a
(OCoLC)1482400472
035
$a
00345243
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
041
0
$a
eng
050
4
$a
HM668
$b
.E34 2025eb
082
0 4
$a
301
$2
23
245
0 0
$a
Effective strategies for combatting social engineering in cybersecurity
$h
[electronic resource] /
$c
Rajeev Kumar, Saurabh Srivastava, Ahmed A. Elngar, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global Scientific Publishing,
$c
2025.
300
$a
1 online resource (xxi, 428 p.) :
$b
ill.
490
1
$a
Advances in information security, privacy, and ethics (AISPE) book series
504
$a
Includes bibliographical references and index.
505
0
$a
Preface -- Chapter 1. Sentiment-Based Summarization of Legal Documents Using Natural Language Processing (NLP) Techniques -- Chapter 2. Exploring Social Engineering Attacks Involving Insights From Case Studies -- Chapter 3. Social Engineering in the Digital Age: A Critical Examination of Attack Techniques, Consequences, and Preventative Measures -- Chapter 4. Cybersecurity in the Age of Social Engineering: Implementing Effective Defense Strategies -- Chapter 5. Exploration of Social Engineering in the Digital Era of Stealth -- Chapter 6. Empowering Cyber Resilience: Effective Strategies for Combating Social Engineering Threats -- Chapter 7. Securing the Weakest Link: Compressive Approaches to Social Engineering Attack Prevention -- Chapter 8. Protecting Against Social Engineering Using Wireshark: Effective Strategies With Real-World Examples -- Chapter 9. Emerging Trends and Future Directions in Social Engineering Defense -- Chapter 10. Exploring the Future Landscape: Emerging Trends in Social Engineering Defense -- Chapter 11. A Comprehensive Guide to Blockchain Technology and Its Role in Enhancing Cyber Security and Combating Social Engineering -- Chapter 12. Social Engineering in Social Media and Online Interactions -- Chapter 13. The Use of Deep Fakes in Social Engineering Attacks: A Case Study on Social Media Engagements -- Chapter 14. The Rising Threat of Deepfake Technology and Frightening Advancementsof Social Engineering -- Chapter 15. Phishing Detection System Using Machine Learning -- Chapter 16. Assortment of Social Engineering Attacks in the New Digital Era -- Compilation of References -- About the Contributors -- Index.
520
3
$a
Effective Strategies for Combatting Social Engineering in Cybersecurity offers a thorough exploration of these challenges, providing a well-rounded approach to understanding and countering social engineering threats. It delves into the theoretical aspects of social engineering, including the psychological principles that drive these attacks, while also offering practical solutions through real-world case studies and applications. By bridging the gap between theory andpractice, the book equips academics, practitioners, and policymakers with actionable strategies to enhance their defenses.
538
$a
Mode of access: World Wide Web.
650
0
$a
Social engineering.
$3
631145
650
0
$a
Computer security
$x
Social aspects.
$3
3793614
650
0
$a
Business enterprises
$x
Security measures.
$3
913112
650
0
$a
Computer crimes.
$3
583792
653
$a
Attack Techniques.
653
$a
Blockchain Technology.
653
$a
Consequences and Prevention Measures.
653
$a
Cyber Resilience Strategies.
653
$a
Cyber Security.
653
$a
Deep Fakes.
653
$a
Digital Era of Stealth.
653
$a
Effective Defense Strategies.
653
$a
Machine Learning.
653
$a
Online Interactions.
653
$a
Organizational Resilience.
653
$a
Phishing Detection.
653
$a
Social Engineering Attacks.
653
$a
Wireshark Effective Strategies.
655
4
$a
Electronic books.
$2
lcsh
$3
542853
700
1
$a
Elngar, Ahmed A.
$3
3720698
700
1
$a
Srivastava, Saurabh.
$3
3793523
700
1
$a
Kumar, Rajeev.
$3
2179467
710
2
$a
IGI Global.
$3
1361470
776
0 8
$i
Print version:
$z
9798369366653
830
0
$a
Advances in information security, privacy, and ethics (AISPE) book series.
$3
3675641
856
4 0
$u
https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-6665-3
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9521101
電子資源
11.線上閱覽_V
電子書
EB HM668 .E34 2025eb
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入