Phishing dark waters: the offensive and defensive sides of malicious emails
An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Indianapolis, IN
Wiley
[2015]
|
Schlagworte: | |
Online-Zugang: | FRO01 TUM01 UBG01 UBY01 Volltext |
Zusammenfassung: | An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or clo |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781118958490 1118958497 9781118958483 1118958489 9781119183624 1119183626 |
DOI: | 10.1002/9781119183624 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043737974 | ||
003 | DE-604 | ||
005 | 20220215 | ||
007 | cr|uuu---uuuuu | ||
008 | 160826s2015 |||| o||u| ||||||eng d | ||
020 | |a 9781118958490 |9 978-1-118-95849-0 | ||
020 | |a 1118958497 |9 1-118-95849-7 | ||
020 | |a 9781118958483 |9 978-1-118-95848-3 | ||
020 | |a 1118958489 |9 1-118-95848-9 | ||
020 | |a 9781119183624 |9 978-1-119-18362-4 | ||
020 | |a 1119183626 |9 1-119-18362-6 | ||
024 | 7 | |a 10.1002/9781119183624 |2 doi | |
035 | |a (ZDB-35-WIC)ocn905490497 | ||
035 | |a (OCoLC)905490497 | ||
035 | |a (DE-599)BVBBV043737974 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-861 |a DE-706 | ||
082 | 0 | |a 364.1632 |2 23 | |
100 | 1 | |a Hadnagy, Christopher |e Verfasser |0 (DE-588)143224042 |4 aut | |
245 | 1 | 0 | |a Phishing dark waters |b the offensive and defensive sides of malicious emails |c Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke |
264 | 1 | |a Indianapolis, IN |b Wiley |c [2015] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
340 | |a Online-Ressource | ||
505 | 8 | |a Includes bibliographical references and index | |
520 | |a An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or clo | ||
650 | 7 | |a SOCIAL SCIENCE / Criminology |2 bisacsh | |
650 | 7 | |a Electronic mail messages |2 fast | |
650 | 7 | |a Phishing |2 fast | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer security | |
650 | 4 | |a Hackers | |
650 | 4 | |a Social engineering | |
650 | 4 | |a Phishing | |
650 | 4 | |a Electronic mail messages | |
650 | 0 | 7 | |a Phishing |0 (DE-588)7515821-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Phishing |0 (DE-588)7515821-8 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Fincher, Michele |4 aut | |
700 | 1 | |a Dreeke, Robin |4 wst | |
856 | 4 | 0 | |u https://doi.org/10.1002/9781119183624 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029149751 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183624 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183624 |l TUM01 |p ZDB-35-WIC |q TUM_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183624 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1002/9781119183624 |l UBY01 |p ZDB-35-WIC |q UBY_PDA_WIC_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176537041240064 |
---|---|
any_adam_object | |
author | Hadnagy, Christopher Fincher, Michele |
author_GND | (DE-588)143224042 |
author_facet | Hadnagy, Christopher Fincher, Michele |
author_role | aut aut |
author_sort | Hadnagy, Christopher |
author_variant | c h ch m f mf |
building | Verbundindex |
bvnumber | BV043737974 |
collection | ZDB-35-WIC |
contents | Includes bibliographical references and index |
ctrlnum | (ZDB-35-WIC)ocn905490497 (OCoLC)905490497 (DE-599)BVBBV043737974 |
dewey-full | 364.1632 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.1632 |
dewey-search | 364.1632 |
dewey-sort | 3364.1632 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
doi_str_mv | 10.1002/9781119183624 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03168nmm a2200649zc 4500</leader><controlfield tag="001">BV043737974</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220215 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160826s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118958490</subfield><subfield code="9">978-1-118-95849-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118958497</subfield><subfield code="9">1-118-95849-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118958483</subfield><subfield code="9">978-1-118-95848-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118958489</subfield><subfield code="9">1-118-95848-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119183624</subfield><subfield code="9">978-1-119-18362-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119183626</subfield><subfield code="9">1-119-18362-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781119183624</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn905490497</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)905490497</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043737974</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.1632</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hadnagy, Christopher</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)143224042</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Phishing dark waters</subfield><subfield code="b">the offensive and defensive sides of malicious emails</subfield><subfield code="c">Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, IN</subfield><subfield code="b">Wiley</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="340" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or clo</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE / Criminology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic mail messages</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Phishing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Phishing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic mail messages</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Phishing</subfield><subfield code="0">(DE-588)7515821-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Phishing</subfield><subfield code="0">(DE-588)7515821-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fincher, Michele</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dreeke, Robin</subfield><subfield code="4">wst</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1002/9781119183624</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029149751</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183624</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183624</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">TUM_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183624</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1002/9781119183624</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBY_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043737974 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:33:45Z |
institution | BVB |
isbn | 9781118958490 1118958497 9781118958483 1118958489 9781119183624 1119183626 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029149751 |
oclc_num | 905490497 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-861 DE-706 |
owner_facet | DE-91 DE-BY-TUM DE-861 DE-706 |
physical | 1 Online-Ressource |
psigel | ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC TUM_PDA_WIC_Kauf ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC UBY_PDA_WIC_Kauf |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Wiley |
record_format | marc |
spelling | Hadnagy, Christopher Verfasser (DE-588)143224042 aut Phishing dark waters the offensive and defensive sides of malicious emails Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke Indianapolis, IN Wiley [2015] 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Online-Ressource Includes bibliographical references and index An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or clo SOCIAL SCIENCE / Criminology bisacsh Electronic mail messages fast Phishing fast Computer crimes Computer security Hackers Social engineering Phishing Electronic mail messages Phishing (DE-588)7515821-8 gnd rswk-swf Phishing (DE-588)7515821-8 s 1\p DE-604 Fincher, Michele aut Dreeke, Robin wst https://doi.org/10.1002/9781119183624 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Hadnagy, Christopher Fincher, Michele Phishing dark waters the offensive and defensive sides of malicious emails Includes bibliographical references and index SOCIAL SCIENCE / Criminology bisacsh Electronic mail messages fast Phishing fast Computer crimes Computer security Hackers Social engineering Phishing Electronic mail messages Phishing (DE-588)7515821-8 gnd |
subject_GND | (DE-588)7515821-8 |
title | Phishing dark waters the offensive and defensive sides of malicious emails |
title_auth | Phishing dark waters the offensive and defensive sides of malicious emails |
title_exact_search | Phishing dark waters the offensive and defensive sides of malicious emails |
title_full | Phishing dark waters the offensive and defensive sides of malicious emails Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke |
title_fullStr | Phishing dark waters the offensive and defensive sides of malicious emails Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke |
title_full_unstemmed | Phishing dark waters the offensive and defensive sides of malicious emails Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke |
title_short | Phishing dark waters |
title_sort | phishing dark waters the offensive and defensive sides of malicious emails |
title_sub | the offensive and defensive sides of malicious emails |
topic | SOCIAL SCIENCE / Criminology bisacsh Electronic mail messages fast Phishing fast Computer crimes Computer security Hackers Social engineering Phishing Electronic mail messages Phishing (DE-588)7515821-8 gnd |
topic_facet | SOCIAL SCIENCE / Criminology Electronic mail messages Phishing Computer crimes Computer security Hackers Social engineering |
url | https://doi.org/10.1002/9781119183624 |
work_keys_str_mv | AT hadnagychristopher phishingdarkwaterstheoffensiveanddefensivesidesofmaliciousemails AT finchermichele phishingdarkwaterstheoffensiveanddefensivesidesofmaliciousemails AT dreekerobin phishingdarkwaterstheoffensiveanddefensivesidesofmaliciousemails |