Phishing dark waters : the offensive and defensive sides of malicious emails / (Record no. 13968)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05703cam a2200841Ii 4500 |
001 - CONTROL NUMBER | |
control field | ocn905490497 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20171224114846.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu---unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 150323t20152015inua ob 001 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | N$T |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | N$T |
Modifying agency | N$T |
-- | BAL |
-- | CDX |
-- | IDEBK |
-- | E7B |
-- | YDXCP |
-- | OCLCF |
-- | EBLCP |
-- | BAB |
-- | RECBK |
-- | UMI |
-- | DEBBG |
-- | TEFOD |
-- | DEBSZ |
-- | OCLCQ |
-- | W2U |
-- | DG1 |
-- | BAL |
-- | KSU |
-- | COO |
-- | D6H |
-- | K6U |
019 ## - | |
-- | 905994359 |
-- | 910165715 |
-- | 926298159 |
-- | 938507249 |
-- | 961646400 |
-- | 962625058 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781118958490 |
Qualifying information | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1118958497 |
Qualifying information | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781118958483 |
Qualifying information | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1118958489 |
Qualifying information | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Cancelled/invalid ISBN | 9781118958476 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Cancelled/invalid ISBN | 1118958470 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119183624 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119183626 |
024 8# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 12350206 |
029 1# - (OCLC) | |
OCLC library identifier | DEBBG |
System control number | BV042683513 |
029 1# - (OCLC) | |
OCLC library identifier | DEBSZ |
System control number | 446587184 |
029 1# - (OCLC) | |
OCLC library identifier | CHSLU |
System control number | 001221858 |
029 1# - (OCLC) | |
OCLC library identifier | DEBSZ |
System control number | 453328806 |
029 1# - (OCLC) | |
OCLC library identifier | GBVCP |
System control number | 823554597 |
029 1# - (OCLC) | |
OCLC library identifier | DEBBG |
System control number | BV043615820 |
029 1# - (OCLC) | |
OCLC library identifier | DEBBG |
System control number | BV043737974 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)905490497 |
Canceled/invalid control number | (OCoLC)905994359 |
-- | (OCoLC)910165715 |
-- | (OCoLC)926298159 |
-- | (OCoLC)938507249 |
-- | (OCoLC)961646400 |
-- | (OCoLC)962625058 |
037 ## - SOURCE OF ACQUISITION | |
Stock number | CL0500000595 |
Source of stock number/acquisition | Safari Books Online |
037 ## - SOURCE OF ACQUISITION | |
Stock number | 40BE1AD8-74C7-49B9-88D2-38870F93202D |
Source of stock number/acquisition | OverDrive, Inc. |
Note | http://www.overdrive.com |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | HV6773.15.P45 |
Item number | H33 2015eb |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | SOC |
Subject category code subdivision | 004000 |
Source | bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 364.1632 |
Edition number | 23 |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | MAIN |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Hadnagy, Christopher, |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Phishing dark waters : the offensive and defensive sides of malicious emails / |
Statement of responsibility, etc | Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke. |
264 #1 - | |
-- | Indianapolis, IN : |
-- | Wiley, |
-- | [2015] |
264 #4 - | |
-- | ©2015 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource : |
Other physical details | color illustrations. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references and index. |
588 0# - | |
-- | Print version record. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | An Introduction to the Wild World of Phishing -- The Psychological Principles of Decision-Making -- Influence and Manipulation -- Lessons in Protection -- Plan Your Phishing Trip: Creating the Enterprise Phishing Program -- The Good, the Bad, and the Ugly: Policies and More -- The Professional Phisher's Tackle Bag -- Phish Like a Boss. |
520 ## - SUMMARY, ETC. | |
Summary, etc | "An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program. Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer. Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay. Learn what a phish is, and the deceptive ways they've been used Understand decision-making, and the sneaky ways phishers reel you in Recognize different types of phish, and know what to do when you catch one Use phishing as part of your security awareness program for heightened protection Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. Phishing Dark Waters is an indispensable guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe"--publisher's description. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Phishing. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Electronic mail messages. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | SOCIAL SCIENCE / Criminology |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Electronic mail messages. |
Source of heading or term | fast |
-- | (OCoLC)fst00907328 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Phishing. |
Source of heading or term | fast |
-- | (OCoLC)fst01737436 |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer crimes. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Hackers. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Social engineering. |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Fincher, Michele, |
Relator term | author. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Dreeke, Robin, |
Relator term | writer of supplementary textual content. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Print version: |
Main entry heading | Hadnagy, Christopher. |
Title | Phishing Dark Waters : The Offensive and Defensive Sides of Malicious Emails |
International Standard Book Number | 9781118958476 |
Record control number | (OCoLC)904332085 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="http://onlinelibrary.wiley.com/book/10.1002/9781119183624">http://onlinelibrary.wiley.com/book/10.1002/9781119183624</a> |
Public note | Wiley Online Library |
938 ## - | |
-- | EBSCOhost |
-- | EBSC |
-- | 969390 |
938 ## - | |
-- | Coutts Information Services |
-- | COUT |
-- | 29743281 |
938 ## - | |
-- | Ingram Digital eBook Collection |
-- | IDEB |
-- | cis29819396 |
938 ## - | |
-- | ebrary |
-- | EBRY |
-- | ebr11034356 |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 12350206 |
938 ## - | |
-- | EBL - Ebook Library |
-- | EBLB |
-- | EBL1895166 |
938 ## - | |
-- | Recorded Books, LLC |
-- | RECE |
-- | rbeEB00612018 |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 12673756 |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 12767026 |
994 ## - | |
-- | 92 |
-- | DG1 |
No items available.