|Aangeboden in rubriek:
Hebt u iets om te verkopen?

Phishing Dark Waters: The Offensive and Defensi, Hadnagy, Fincher, Dreeke+=

Objectstaat:
Nieuw
3 beschikbaar
Prijs:
US $37,19
OngeveerEUR 34,30
Verzendkosten:
Gratis Voordelige verzendservice. Details bekijkenvoor verzending
Bevindt zich in: NY, Verenigde Staten
Levering:
Geschatte levering tussen za, 8 jun en za, 15 jun tot 43230
Bij geschatte leveringsdatums - nieuw venster of tabblad wordt rekening gehouden met de verwerkingstijd van de verkoper, de postcode van de verzendlocatie, de postcode van de bestemming, en het moment van aanvaarding. Geschatte leveringsdatums zijn ook afhankelijk van de geselecteerde verzendservice en de ontvangst van de betalingbetaling ontvangen - nieuw venster of tabblad. De leveringstermijnen kunnen variëren, vooral gedurende piekperiodes.
Retourbeleid:
30 dagen om te retourneren. Koper betaalt voor retourzending. Details bekijken- voor meer informatie over retourzendingen
Betalingen:
     

Winkel met vertrouwen

Topverkoper
Betrouwbare verkoper, snelle verzending en eenvoudige retourzending. 
Geld-terug-garantie van eBay
Ontvang het object dat u hebt besteld of krijg uw geld terug. 

Verkopergegevens

Ingeschreven als zakelijke verkoper
De verkoper neemt de volledige verantwoordelijkheid voor deze aanbieding.
eBay-objectnummer:392509705763
Laatst bijgewerkt op 09 mei 2024 16:59:24 CESTAlle herzieningen bekijkenAlle herzieningen bekijken

Specificaties

Objectstaat
Nieuw: Een nieuw, ongelezen en ongebruikt boek in perfecte staat waarin geen bladzijden ontbreken of ...
PublishedOn
2015-05-15
ISBN
9781118958476
EAN
9781118958476
Publication Year
2015
Type
Textbook
Format
Trade Paperback
Language
English
Publication Name
Phishing Dark Waters : the Offensive and Defensive Sides of Malicious Emails
Item Height
0.4in
Author
Michele Fincher, Christopher Hadnagy
Item Length
8.9in
Publisher
Wiley & Sons, Incorporated, John
Item Width
6in
Item Weight
9.6 Oz
Number of Pages
224 Pages

Over dit product

Product Information

Learn to catch a phish without becoming live bait. Phishing e-mails create daily havoc for both individuals and organizations. A social engineering technique that preys on our human nature, phishing remains remarkably successful for scammers and malicious social engineers despite increasingly sophisticated security programs and awareness campaigns. Christopher Hadnagy and Michele Fincher, practitioners and consultants in human-based security, have spent years working to understand how and why phishing works. In this book, they dissect what a phish is, why it succeeds, and the principles behind it, fully exposing all of its flaws and detailing innovative ways to defend against it. Focusing on the basics of the phish, the underlying psychology, the skillful use of influence, and a creative program to use the phisher's weapons against him, this highly readable guide provides tools for both individuals and corporations. Hadnagy and Fincher examine some of the most current and effective phish, show you how to spot a spoofed e-mail or cloned website, explore phishing education platforms that work, and demonstrate how to create your own phish to use in your security awareness program. Despite legislation, user training, public awareness, and technical security, phishing persists because it exploits our natural responses to e-mail requests. Phishing Dark Waters, The Offensive and Defensive Sides of Malicious E-mails arms you with a greater understanding of: The psychological principles that make phishing effective High-profile breaches, including Target, RSA, and Coca-Cola, that began with a phish Common scams, including those following natural disasters and other highly publicized events Different goals of attackers: financial, corporate espionage, national security, and identity theft threats How to protect your enterprise with a corporate phishing program and integrate it into company policies Ways to catch a phish Why most security awareness programs don't work

Product Identifiers

Publisher
Wiley & Sons, Incorporated, John
ISBN-10
1118958470
ISBN-13
9781118958476
eBay Product ID (ePID)
204203542

Product Key Features

Author
Michele Fincher, Christopher Hadnagy
Publication Name
Phishing Dark Waters : the Offensive and Defensive Sides of Malicious Emails
Format
Trade Paperback
Language
English
Publication Year
2015
Type
Textbook
Number of Pages
224 Pages

Dimensions

Item Length
8.9in
Item Height
0.4in
Item Width
6in
Item Weight
9.6 Oz

Additional Product Features

Lc Classification Number
Hv6773.15.P45h34
Table of Content
Foreword xxiii Introduction xxvii Chapter 1 An Introduction to the Wild World of Phishing 1 Phishing 101 2 How People Phish 4 Examples 7 High-Profi le Breaches 7 Phish in Their Natural Habitat 10 Phish with Bigger Teeth 22 Spear Phishing 27 Summary 29 Chapter 2 The Psychological Principles of Decision-Making 33 Decision-Making: Small Bits 34 Cognitive Bias 35 Physiological States 37 External Factors 38 The Bottom Line About Decision-Making 39 It Seemed Like a Good Idea at the Time 40 How Phishers Bait the Hook 41 Introducing the Amygdala 44 The Guild of Hijacked Amygdalas 45 Putting a Leash on the Amygdala 48 Wash, Rinse, Repeat 49 Summary 50 Chapter 3 Influence and Manipulation 53 Why the Difference Matters to Us 55 How Do I Tell the Difference? 56 How Will We Build Rapport with Our Targets? 56 How Will Our Targets Feel After They Discover They''ve Been Tested? 56 What Is Our Intent? 57 But the Bad Guys Will Use Manipulation . . . 57 Lies, All Lies 58 P Is for Punishment 59 Principles of Influence 61 Reciprocity 61 Obligation 62 Concession 63 Scarcity 63 Authority 64 Consistency and Commitment 65 Liking 66 Social Proof 67 More Fun with Influence 67 Our Social Nature 67 Physiological Response 68 Psychological Response 69 Things to Know About Manipulation 70 Summary 71 Chapter 4 Lessons in Protection 75 Lesson One: Critical Thinking 76 How Can Attackers Bypass This Method? 77 Lesson Two: Learn to Hover 77 What If I Already Clicked the Link and I Think It''s Dangerous? 80 How Can Attackers Bypass This Method? 81 Lesson Three: URL Deciphering 82 How Can Attackers Bypass This Method? 85 Lesson Four: Analyzing E-mail Headers 85 How Can Attackers Bypass This Method? 90 Lesson Five: Sandboxing 90 How Can Attackers Bypass This Method? 91 The "Wall of Sheep," or a Net of Bad Ideas 92 Copy and Paste Your Troubles Away 92 Sharing Is Caring 93 My Mobile Is Secure 94 A Good Antivirus Program Will Save You 94 Summary 95 Chapter 5 Plan Your Phishing Trip: Creating the Enterprise Phishing Program 97 The Basic Recipe 99 Why? 99 What''s the Theme? 102 The Big, Fat, Not-So-Legal Section 105 Developing the Program 107 Setting a Baseline 108 Setting the Difficulty Level 109 Writing the Phish 121 Tracking and Statistics 122 Reporting 125 Phish, Educate, Repeat 127 Summary 128 Chapter 6 The Good, the Bad, and the Ugly: Policies and More 131 Oh, the Feels: Emotion and Policies 132 The Definition 132 The Bad 133 Making It "Good" 133 The Boss Is Exempt 133 The Definition 134 The Bad 134 Making It "Good" 134 I''ll Just Patch One of the Holes 135 The Definition 135 The Bad 136 Making It "Good" 136 Phish Just Enough to Hate It 136 The Definition 137 The Bad 137 Making It "Good" 138 If You Spot a Phish, Call This Number 138 The Definition 139 The Bad 139 Making It "Good" 140 The Bad Guys Take Mondays Off 140 The Definition 141 The Bad 141 Making It "Good" 141 If You Can''t See It, You Are Safe 142 The Definition 142 The Bad 143 Making It "Good" 143 The Lesson for Us All 143 Summary 144 Chapter 7 The Professional Phisher''s Tackle Bag 147 Commercial Applications 149 Rapid7 Metasploit Pro 149 ThreatSim 152 PhishMe 158 Wombat PhishGuru 161 PhishLine 165 Open Source Applications 168 SET: Social-Engineer Toolkit 168 Phishing Frenzy 171 Comparison Chart 174 Managed or Not 176 Summary 177 Chapter 8 Phish Like a Boss 179 Phishing the Deep End 180 Understand What You''re Dealing With 180 Set Realistic Goals for Your Organization 182 Plan Your Program 183 Understand the Stats 183 Respond Appropriately 184 Make the Choice: Build Inside or Outside 186 Summary 187 Index 189
Copyright Date
2015
Topic
Sociology / General, Security / General
Lccn
2015-933609
Dewey Decimal
364.1632
Intended Audience
Trade
Dewey Edition
23
Illustrated
Yes
Genre
Computers, Social Science

Objectbeschrijving van de verkoper

Informatie van zakelijke verkoper

WRAP Ltd
Mubin Ahmed
2 Lester Way
Wallingford
OX10 9TA
United Kingdom
Contactgegevens weergeven
:liam-Eku.oc.skoobemosewa@asuyabe
Btw-nummer:
  • GB 724498118
Handelsregistratienummer:
  • 03800600
Ik verklaar dat al mijn verkoopactiviteiten zullen voldoen aan alle wet- en regelgeving van de EU.
Awesomebooksusa

Awesomebooksusa

98% positieve feedback
1,2M objecten verkocht

Gedetailleerde verkopersbeoordelingen

Gemiddelde van de afgelopen 12 maanden

Nauwkeurige beschrijving
4.8
Redelijke verzendkosten
5.0
Verzendtijd
4.9
Communicatie
4.9

Populaire rubrieken in deze winkel

Ingeschreven als zakelijke verkoper

Feedback verkoper (513.501)

a***a (120)- Feedback gegeven door koper.
Afgelopen maand
Geverifieerde aankoop
Great Seller!
a***f (3326)- Feedback gegeven door koper.
Afgelopen maand
Geverifieerde aankoop
Very good
8***a (421)- Feedback gegeven door koper.
Afgelopen maand
Geverifieerde aankoop
Thanks! Item shipped promptly and was received as described. Great seller!