Phishing and communication channels : a guide to identifying and mitigating phishing attacks / (Record no. 91242)

MARC details
000 -LEADER
fixed length control field 02070nam a22001697a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 231201b2022 |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781484291269
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 364.1632 SON-G
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Sonowal, Gunikhan
245 ## - TITLE STATEMENT
Title Phishing and communication channels : a guide to identifying and mitigating phishing attacks /
Statement of responsibility, etc. Gunikhan Sonowal
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. India
Name of publisher, distributor, etc. Apress
Date of publication, distribution, etc. 2022
300 ## - PHYSICAL DESCRIPTION
Extent 220 p.
365 ## - TRADE PRICE
Price type code INR
Price amount 899.00
500 ## - GENERAL NOTE
General note Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.<br/><br/>The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication.<br/><br/>Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon’s 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack.<br/><br/>This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations from phishing attacks.<br/><br/>What You Will Learn:<br/>* Understand various forms of phishing attacks, including deceptive, DNS-based, search engine, and contents injection phishing<br/>* Know which communications are most commonly used, including email, SMS, voice, blog, wifi, and more<br/>* Be familiar with phishing kits (what they are) and how security experts utilize them to improve user awareness<br/>* Be aware of the techniques that attackers most commonly use to request information<br/>* Master the best solutions (including educational, legal, technical) to protect against phishing attacks
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection
952 ## - LOCATION AND ITEM INFORMATION (KOHA)
Withdrawn status
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
  Dewey Decimal Classification     360 BITS Pilani Hyderabad BITS Pilani Hyderabad General Stack (For lending) 01/12/2023   364.1632 SON-G 47562 13/07/2024 01/12/2023 Books
An institution deemed to be a University Estd. Vide Sec.3 of the UGC
Act,1956 under notification # F.12-23/63.U-2 of Jun 18,1964

© 2024 BITS-Library, BITS-Hyderabad, India.