Buy seco-project.eu ?

Products related to Phishing:


  • Fighting Phishing : Everything You Can Do to Fight Social Engineering and Phishing
    Fighting Phishing : Everything You Can Do to Fight Social Engineering and Phishing

    Keep valuable data safe from even the most sophisticated social engineering and phishing attacks Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to individuals.Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense.This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware.Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture.Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against themEducate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they beginDiscover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreadingDevelop technology and security policies that protect your organization against the most common types of social engineering and phishing Anyone looking to defend themselves or their organization from phishing will appreciate the uncommonly comprehensive approach in Fighting Phishing.

    Price: 21.99 £ | Shipping*: 3.99 £
  • Generative AI : Phishing And Cybersecurity Metrics
    Generative AI : Phishing And Cybersecurity Metrics

    The cybersecurity landscape is changing, for sure. For example, one of the oldest threat variants is that of phishing.It evolved in the early 1990s, but even today it is still being used as a primary threat variant and has now become much more sophisticated, covert, and stealthy in nature.For example, it can be used to launch ransomware, social engineering, and extortion attacks. The advent of Generative AI is making this much worse.For example, a cyberattacker can now use something like ChatGPT to craft the content for phishing emails that are so convincing that it is almost impossible to tell the difference between what is real and what is fake.This is also clearly evident in the use of deepfakes, where fake images of real people are replicated to create videos to lure unsuspecting victims to a fake website. But Generative AI can also be used for the good to combat Phishing Attacks.This is the topic of this book. In this, we cover the following:A review of phishingA review of AI, Neural Networks, and Machine LearningA review of Natural Language Processing, Generative AI, and the Digital Person A proposed solution as to how Generative AI can combat phishing attacks as they relate to Privileged Access accounts

    Price: 24.99 £ | Shipping*: 3.99 £
  • Phishing for Phools : The Economics of Manipulation and Deception
    Phishing for Phools : The Economics of Manipulation and Deception

    Ever since Adam Smith, the central teaching of economics has been that free markets provide us with material well-being, as if by an invisible hand.In Phishing for Phools, Nobel Prize-winning economists George Akerlof and Robert Shiller deliver a fundamental challenge to this insight, arguing that markets harm as well as help us.As long as there is profit to be made, sellers will systematically exploit our psychological weaknesses and our ignorance through manipulation and deception.Rather than being essentially benign and always creating the greater good, markets are inherently filled with tricks and traps and will "phish" us as "phools." Phishing for Phools therefore strikes a radically new direction in economics, based on the intuitive idea that markets both give and take away.Akerlof and Shiller bring this idea to life through dozens of stories that show how phishing affects everyone, in almost every walk of life.We spend our money up to the limit, and then worry about how to pay the next month's bills.The financial system soars, then crashes. We are attracted, more than we know, by advertising.Our political system is distorted by money. We pay too much for gym memberships, cars, houses, and credit cards.Drug companies ingeniously market pharmaceuticals that do us little good, and sometimes are downright dangerous. Phishing for Phools explores the central role of manipulation and deception in fascinating detail in each of these areas and many more.It thereby explains a paradox: why, at a time when we are better off than ever before in history, all too many of us are leading lives of quiet desperation.At the same time, the book tells stories of individuals who have stood against economic trickery--and how it can be reduced through greater knowledge, reform, and regulation.

    Price: 15.99 £ | Shipping*: 3.99 £
  • Phishing Dark Waters : The Offensive and Defensive Sides of Malicious Emails
    Phishing Dark Waters : The Offensive and Defensive Sides of Malicious Emails

    An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails.Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient.With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website.Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks.Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program. Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer.Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay. Learn what a phish is, and the deceptive ways they've been usedUnderstand decision-making, and the sneaky ways phishers reel you inRecognize different types of phish, and know what to do when you catch oneUse phishing as part of your security awareness program for heightened protection Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations.Phishing Dark Waters is an indispensible guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe.

    Price: 26.99 £ | Shipping*: 3.99 £

Similar search terms for Phishing:


  • Project Management for Engineering, Business and Technology
    Project Management for Engineering, Business and Technology

    Project Management for Engineering, Business and Technology is a highly regarded textbook that addresses project management across all industries.First covering the essential background, from origins and philosophy to methodology, the bulk of the book is dedicated to concepts and techniques for practical application.Coverage includes project initiation and proposals, scope and task definition, scheduling, budgeting, risk analysis, control, project selection and portfolio management, program management, project organization, and all-important "people" aspects—project leadership, team building, conflict resolution, and stress management. The systems development cycle is used as a framework to discuss project management in a variety of situations, making this the go-to book for managing virtually any kind of project, program, or task force.The authors focus on the ultimate purpose of project management—to unify and integrate the interests, resources and work efforts of many stakeholders, as well as the planning, scheduling, and budgeting needed to accomplish overall project goals. This sixth edition features: updates throughout to cover the latest developments in project management methodologies; a new chapter on project procurement management and contracts; an expansion of case study coverage throughout, including those on the topic of sustainability and climate change, as well as cases and examples from across the globe, including India, Africa, Asia, and Australia; and extensive instructor support materials, including an instructor’s manual, PowerPoint slides, answers to chapter review questions and a test bank of questions.Taking a technical yet accessible approach, this book is an ideal resource and reference for all advanced undergraduate and graduate students in project management courses, as well as for practicing project managers across all industry sectors.

    Price: 61.99 £ | Shipping*: 0.00 £
  • The Weakest Link : How to Diagnose, Detect, and Defend Users from Phishing
    The Weakest Link : How to Diagnose, Detect, and Defend Users from Phishing


    Price: 27.00 £ | Shipping*: 3.99 £
  • Paradigms on Technology Development for Security Practitioners
    Paradigms on Technology Development for Security Practitioners

    ?This open access book is authored by a rich mix of contributors from across the landscape of research, academia, LEAs, civil protection, and other first responders, practitioners, public and private organizations and industry to address some of the most contemporary challenges within global security domain.The authors cover topics such as protection of critical infrastructures (CI), serious and organized crime, counter (cyber) terrorism, border management, cybercrime, cybersecurity, management of disasters and crises, big data analytics, the application of AI and the legal and ethical dimensions of the implementation of cutting-edge technologies.The book benefits from research actions and lessons learned from more than 35 EU R&D projects within the security domain.The book not only addresses theoretical narratives pertinent to the subject but also identifies current challenges and emerging security threats, provides analysis of operational capability gaps, real world applied solutions, methodologies, and case studies within security domain. This is an open access book.

    Price: 44.99 £ | Shipping*: 0.00 £
  • Phishing for Nazis : Conspiracies, Anonymous Communications and White Supremacy Networks on the Dark Web
    Phishing for Nazis : Conspiracies, Anonymous Communications and White Supremacy Networks on the Dark Web

    Phishing for Nazis is an evidence-based, undercover study of neo-Nazi communities on anonymous communication platforms that helps to shine a light on the dark web.It unveils how hatred and conspiracies spread and thrive online and how white supremacy is becoming prominent as extremists find shelter in the online dank underbelly of society. Phishing for Nazis explains how online manifestations of hate radicalize people into taking “real-world” action, such as shooting sprees.Methodologically, this book is unique, as it incorporates undercover cyberethnography, a method frequently used by law enforcement and intelligence agencies, unlike traditional academic studies of racism or social behavior that rely on secondary sources or surveys. With a particular interest on how race issues translate online, the book presents the true phenomenon of racism without relying on political correctness or whitewashing.It contributes to the field of cyber communication, as it details why and how people communicate and manage entire communities without knowing one another.The book also contributes to public policy, regulators, and technology companies as they deal with the practice of online anonymity and extremism.

    Price: 33.99 £ | Shipping*: 0.00 £

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.