05354nam 2200661 450 991081240550332120200520144314.01-118-95849-7(CKB)3710000000377848(EBL)1895166(SSID)ssj0001495350(PQKBManifestationID)11874025(PQKBTitleCode)TC0001495350(PQKBWorkID)11450283(PQKB)11220604(MiAaPQ)EBC1895166(Au-PeEL)EBL1895166(CaPaEBR)ebr11034356(CaONFJC)MIL770077(OCoLC)905490497(PPN)243410182(EXLCZ)99371000000037784820150406h20152015 uy| 0engur|n|---|||||txtccrPhishing dark waters the offensive and defensive sides of malicious e-mails /Christopher Hadnagy, Michele Fincher ; foreword by Robin DreekeIndianapolis, Indiana :Wiley,[2015]©20151 online resource (227 p.)Description based upon print version of record.1-119-18362-6 1-118-95847-0 Includes bibliographical references and index.Cover; Title Page; Copyright; Contents; Chapter 1 An Introduction to the Wild World of Phishing; Phishing 101; How People Phish; Examples; High-Profile Breaches; Phish in Their Natural Habitat; Phish with Bigger Teeth; Spear Phishing; Summary; Chapter 2 The Psychological Principles of Decision-Making; Decision-Making: Small Bits; Cognitive Bias; Physiological States; External Factors; The Bottom Line About Decision-Making; It Seemed Like a Good Idea at the Time; How Phishers Bait the Hook; Introducing the Amygdala; The Guild of Hijacked Amygdalas; Putting a Leash on the AmygdalaWash, Rinse, RepeatSummary; Chapter 3 Influence and Manipulation; Why the Difference Matters to Us; How Do I Tell the Difference?; How Will We Build Rapport with Our Targets?; How Will Our Targets Feel After They Discover They've Been Tested?; What Is Our Intent?; But the Bad Guys Will Use Manipulation . . .; Lies, All Lies; P Is for Punishment; Principles of Influence; Reciprocity; Obligation; Concession; Scarcity; Authority; Consistency and Commitment; Liking; Social Proof; More Fun with Influence; Our Social Nature; Physiological Response; Psychological ResponseThings to Know About ManipulationSummary; Chapter 4 Lessons in Protection; Lesson One: Critical Thinking; How Can Attackers Bypass This Method?; Lesson Two: Learn to Hover; What If I Already Clicked the Link and I Think It's Dangerous?; How Can Attackers Bypass This Method?; Lesson Three: URL Deciphering; How Can Attackers Bypass This Method?; Lesson Four: Analyzing E-mail Headers; How Can Attackers Bypass This Method?; Lesson Five: Sandboxing; How Can Attackers Bypass This Method?; The "Wall of Sheep," or a Net of Bad Ideas; Copy and Paste Your Troubles Away; Sharing Is CaringMy Mobile Is SecureA Good Antivirus Program Will Save You; Summary; Chapter 5 Plan Your Phishing Trip: Creating the Enterprise Phishing Program; The Basic Recipe; Why?; What's the Theme?; The Big, Fat, Not-So-Legal Section; Developing the Program; Setting a Baseline; Setting the Difficulty Level; Writing the Phish; Tracking and Statistics; Reporting; Phish, Educate, Repeat; Summary; Chapter 6 The Good, the Bad, and the Ugly: Policies and More; Oh, the Feels: Emotion and Policies; The Definition; The Bad; Making It "Good"; The Boss Is Exempt; The Definition; The Bad; Making It "Good"I'll Just Patch One of the HolesThe Definition; The Bad; Making It "Good"; Phish Just Enough to Hate It; The Definition; The Bad; Making It "Good"; If You Spot a Phish, Call This Number; The Definition; The Bad; Making It "Good"; The Bad Guys Take Mondays Off; The Definition; The Bad; Making It "Good"; If You Can't See It, You Are Safe; The Definition; The Bad; Making It "Good"; The Lesson for Us All; Summary; Chapter 7 The Professional Phisher's Tackle Bag; Commercial Applications; Rapid7 Metasploit Pro; ThreatSim; PhishMe; Wombat PhishGuru; PhishLine; Open Source ApplicationsSET: Social-Engineer ToolkitAn essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloPhishingIdentity theftPhishing.Identity theft.363.25363.259680973Hadnagy Christopher1657205Fincher MicheleMiAaPQMiAaPQMiAaPQBOOK9910812405503321Phishing dark waters4082130UNINA05857nam 22007575 450 991055523700332120251009103248.09783030925772303092577310.1007/978-3-030-92577-2(CKB)5860000000038001EBL6939387(OCoLC)1310341011(AU-PeEL)EBL6939387(MiAaPQ)EBC6939387(oapen)https://directory.doabooks.org/handle/20.500.12854/81616(DE-He213)978-3-030-92577-2(ODN)ODN0010066523(oapen)doab81616(EXLCZ)99586000000003800120220324d2022 u| 0engur|n|---|||||txtrdacontentcrdamediacrrdacarrierAdaptive Mediation and Conflict Resolution Peace-making in Colombia, Mozambique, the Philippines, and Syria /edited by Cedric de Coning, Ako Muto, Rui Saraiva1st ed. 2022.Cham :Springer International Publishing :Imprint: Palgrave Macmillan,2022.1 online resource (211 p.)Sustainable Development Goals Series,2523-3092Description based upon print version of record.9783030925765 3030925765 1. Adaptive Mediation and Conflict Resolution in Contemporary and Future Armed Conflicts -- 2. Adaptive Mediation -- 3. Adaptive Mediation in Colombia: Toward Institutional Capacity Building Amidst Complexity and Uncertainty -- 4. Peacemaking from Within: Adaptive Mediation of Direct Dialogue in Mozambique’s New Peace Process (2013-2019) -- 5. Adapting from Outsider to Insider Mediation in the Bangsamoro Peace Process, Southern Philippines -- 6. Exploring Mediation Efforts Amidst Systemic and Domestic Constraints: The Case of the Syrian Conflict -- 7. Adapting to Uncertainty: What Have We Learned from Mediation and Conflict Resolution in Colombia, Mozambique, the Philippines, and Syria.‘Books about liberal peacebuilding’s shortcomings rarely go beyond platitudes of inclusion, local ownership, and flexibility. This book grapples seriously with what it would mean to put these principles into grounded practice in the real world of peace mediation and conflict resolution. Adaptive mediation means that the role of internationals is to accompany self-organized home-grown peace processes and to protect them from interference.’ –Thania Paffenholz, Executive Director, Inclusive Peace, Switzerland ‘This book demonstrates that respect for local realities is paramount for sustainable peace because each conflict is different. The argument also underwrites the recent experiences in Afghanistan. The book would be of value to those engaged in peace efforts as well as in post-conflict reconstruction.’ –Tadamichi Yamamoto, Visiting Professor, Doshisha University, Japan, and Former Special Representative of the United Nations Secretary-General for Afghanistan and Head of the United Nations Assistance Mission in Afghanistan ‘This book is a theoretically groundbreaking and empirically rich study on adaptive mediation. It is a must-read for scholars and students of peace and conflict research, as well as for peace practitioners interested in how peace mediation practices can better recognise the complexity of societies and conflict realities, redefine the role of the mediator, and address the demands of locally owned inclusive peace processes.’ –Marko Lehti, Deputy Director of Tampere Peace Research Institute (TAPRI), Finland This open access book introduces adaptive mediation as an alternative approach that enables mediators to go beyond determined-design models of mediation. Adaptive mediation is grounded in complexity theory, and is specifically designed to cope with highly dynamic conflict situations characterized by uncertainty. It is a facilitated mediation process whereby the content of agreements emerges from the parties to the conflict themselves, informed by the context within which the conflict is situated. The book presents the core principles and practices of adaptive mediation with empirical evidence from Colombia, Mozambique, The Philippines, and Syria. Cedric de Coning is Research Professor with the Norwegian Institute of International Affairs (NUPI), and Senior Advisor with the African Center for the Constructive Resolution of Disputes (ACCORD). Ako Muto is Executive Senior Research Fellow at the Japan International Cooperation Agency (JICA) Ogata Sadako Research Institute for Peace and Development. Rui Saraiva is Research Fellow at the Japan International Cooperation Agency (JICA) Ogata Sadako Research Institute for Peace and Development.Sustainable Development Goals Series,2523-3092PeaceMediationDispute resolution (Law)Arbitration (Administrative law)DiplomacyPeace and Conflict StudiesDispute Resolution, Mediation, ArbitrationDiplomacyPeace.Mediation.Dispute resolution (Law)Arbitration (Administrative law)Diplomacy.Peace and Conflict Studies.Dispute Resolution, Mediation, Arbitration.Diplomacy.327.17327.17LAW006000POL011000POL011010bisacshDe Coning Cedric881013Muto Ako1235137Saraiva Rui1235138AU-PeELAU-PeELAU-PeELBOOK9910555237003321Adaptive Mediation and Conflict Resolution2868999UNINA