top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Phishing dark waters : the offensive and defensive sides of malicious e-mails / / Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke
Phishing dark waters : the offensive and defensive sides of malicious e-mails / / Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke
Autore Hadnagy Christopher
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , [2015]
Descrizione fisica 1 online resource (227 p.)
Disciplina 363.25
363.259680973
Soggetto topico Phishing
Identity theft
ISBN 1-118-95849-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Chapter 1 An Introduction to the Wild World of Phishing; Phishing 101; How People Phish; Examples; High-Profile Breaches; Phish in Their Natural Habitat; Phish with Bigger Teeth; Spear Phishing; Summary; Chapter 2 The Psychological Principles of Decision-Making; Decision-Making: Small Bits; Cognitive Bias; Physiological States; External Factors; The Bottom Line About Decision-Making; It Seemed Like a Good Idea at the Time; How Phishers Bait the Hook; Introducing the Amygdala; The Guild of Hijacked Amygdalas; Putting a Leash on the Amygdala
Wash, Rinse, RepeatSummary; Chapter 3 Influence and Manipulation; Why the Difference Matters to Us; How Do I Tell the Difference?; How Will We Build Rapport with Our Targets?; How Will Our Targets Feel After They Discover They've Been Tested?; What Is Our Intent?; But the Bad Guys Will Use Manipulation . . .; Lies, All Lies; P Is for Punishment; Principles of Influence; Reciprocity; Obligation; Concession; Scarcity; Authority; Consistency and Commitment; Liking; Social Proof; More Fun with Influence; Our Social Nature; Physiological Response; Psychological Response
Things to Know About ManipulationSummary; Chapter 4 Lessons in Protection; Lesson One: Critical Thinking; How Can Attackers Bypass This Method?; Lesson Two: Learn to Hover; What If I Already Clicked the Link and I Think It's Dangerous?; How Can Attackers Bypass This Method?; Lesson Three: URL Deciphering; How Can Attackers Bypass This Method?; Lesson Four: Analyzing E-mail Headers; How Can Attackers Bypass This Method?; Lesson Five: Sandboxing; How Can Attackers Bypass This Method?; The "Wall of Sheep," or a Net of Bad Ideas; Copy and Paste Your Troubles Away; Sharing Is Caring
My Mobile Is SecureA Good Antivirus Program Will Save You; Summary; Chapter 5 Plan Your Phishing Trip: Creating the Enterprise Phishing Program; The Basic Recipe; Why?; What's the Theme?; The Big, Fat, Not-So-Legal Section; Developing the Program; Setting a Baseline; Setting the Difficulty Level; Writing the Phish; Tracking and Statistics; Reporting; Phish, Educate, Repeat; Summary; Chapter 6 The Good, the Bad, and the Ugly: Policies and More; Oh, the Feels: Emotion and Policies; The Definition; The Bad; Making It "Good"; The Boss Is Exempt; The Definition; The Bad; Making It "Good"
I'll Just Patch One of the HolesThe Definition; The Bad; Making It "Good"; Phish Just Enough to Hate It; The Definition; The Bad; Making It "Good"; If You Spot a Phish, Call This Number; The Definition; The Bad; Making It "Good"; The Bad Guys Take Mondays Off; The Definition; The Bad; Making It "Good"; If You Can't See It, You Are Safe; The Definition; The Bad; Making It "Good"; The Lesson for Us All; Summary; Chapter 7 The Professional Phisher's Tackle Bag; Commercial Applications; Rapid7 Metasploit Pro; ThreatSim; PhishMe; Wombat PhishGuru; PhishLine; Open Source Applications
SET: Social-Engineer Toolkit
Record Nr. UNINA-9910812405503321
Hadnagy Christopher  
Indianapolis, Indiana : , : Wiley, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Phishing exposed [[electronic resource] /] / Lance James
Phishing exposed [[electronic resource] /] / Lance James
Autore James Lance
Edizione [1st edition]
Pubbl/distr/stampa Rockland, Mass., : Syngress Pub., c2005
Descrizione fisica 1 online resource (416 p.)
Disciplina 364.16/8
Soggetto topico Identity theft
Internet fraud
Phishing
Soggetto genere / forma Electronic books.
ISBN 1-281-03587-4
9786611035877
0-08-048953-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Foreword; Chapter 1 Banking On Phishing; Chapter 2 Go Phish!; Chapter 3 E-Mail: The Weapon of Mass Delivery; Chapter 4 Crossing the Phishing Line; Chapter 5 The Dark Side of the Web; Chapter 6 Malware, Money Movers, and Ma Bell Mayhem!; Chapter 7 So Long, and Thanks for All the Phish!; Index; Related Titles
Record Nr. UNINA-9910450478103321
James Lance  
Rockland, Mass., : Syngress Pub., c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Phishing exposed [[electronic resource] /] / Lance James
Phishing exposed [[electronic resource] /] / Lance James
Autore James Lance
Edizione [1st edition]
Pubbl/distr/stampa Rockland, Mass., : Syngress Pub., c2005
Descrizione fisica 1 online resource (416 p.)
Disciplina 364.16/8
Soggetto topico Identity theft
Internet fraud
Phishing
ISBN 1-281-03587-4
9786611035877
0-08-048953-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Foreword; Chapter 1 Banking On Phishing; Chapter 2 Go Phish!; Chapter 3 E-Mail: The Weapon of Mass Delivery; Chapter 4 Crossing the Phishing Line; Chapter 5 The Dark Side of the Web; Chapter 6 Malware, Money Movers, and Ma Bell Mayhem!; Chapter 7 So Long, and Thanks for All the Phish!; Index; Related Titles
Record Nr. UNINA-9910783753603321
James Lance  
Rockland, Mass., : Syngress Pub., c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Phishing exposed / / Lance James
Phishing exposed / / Lance James
Autore James Lance
Edizione [1st edition]
Pubbl/distr/stampa Rockland, Mass., : Syngress Pub., c2005
Descrizione fisica 1 online resource (416 p.)
Disciplina 364.16/8
Soggetto topico Identity theft
Internet fraud
Phishing
ISBN 1-281-03587-4
9786611035877
0-08-048953-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Foreword; Chapter 1 Banking On Phishing; Chapter 2 Go Phish!; Chapter 3 E-Mail: The Weapon of Mass Delivery; Chapter 4 Crossing the Phishing Line; Chapter 5 The Dark Side of the Web; Chapter 6 Malware, Money Movers, and Ma Bell Mayhem!; Chapter 7 So Long, and Thanks for All the Phish!; Index; Related Titles
Record Nr. UNINA-9910826163403321
James Lance  
Rockland, Mass., : Syngress Pub., c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes / / Edited by Simon S. Woo, Shahroz Tariq, Sharif Abuadbba, Kristen Moore
Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes / / Edited by Simon S. Woo, Shahroz Tariq, Sharif Abuadbba, Kristen Moore
Pubbl/distr/stampa New York, New York, United States : , : Association for Computing Machinery, , 2023
Descrizione fisica 1 online resource (37 pages)
Altri autori (Persone) WooSimon S
TariqShahroz
AbuadbbaSharif
MooreKristen
Collana ACM Conferences.
Soggetto topico Computer science
Virtual reality
Information extraction
Identity theft
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti WDC '23
Record Nr. UNISA-996552467503316
New York, New York, United States : , : Association for Computing Machinery, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes / / Edited by Simon S. Woo, Shahroz Tariq, Sharif Abuadbba, Kristen Moore
Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes / / Edited by Simon S. Woo, Shahroz Tariq, Sharif Abuadbba, Kristen Moore
Pubbl/distr/stampa New York, New York, United States : , : Association for Computing Machinery, , 2023
Descrizione fisica 1 online resource (37 pages)
Altri autori (Persone) WooSimon S
TariqShahroz
AbuadbbaSharif
MooreKristen
Collana ACM Conferences.
Soggetto topico Computer science
Virtual reality
Information extraction
Identity theft
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti WDC '23
Record Nr. UNINA-9910746499303321
New York, New York, United States : , : Association for Computing Machinery, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The spread of tax fraud by identity theft [[electronic resource] ] : : hearing before the Subcommittee on Fiscal Responsibility and Economic Growth of the Committee on Finance, United States Senate, One Hundred Twelfth Congress
The spread of tax fraud by identity theft [[electronic resource] ] : : hearing before the Subcommittee on Fiscal Responsibility and Economic Growth of the Committee on Finance, United States Senate, One Hundred Twelfth Congress
Pubbl/distr/stampa Washington, : U.S. G.P.O., 2011-
Descrizione fisica 1 online resource (v.) : illustrations
Collana S. hrg.
Soggetto topico Identity theft - United States
Tax evasion - United States
Identity theft
Tax evasion
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. [1]. A threat to taxpayers, a drain on the public treasury -- pt. 2. Status, progress, and potential solutions.
Altri titoli varianti Spread of tax fraud by identity theft
Record Nr. UNINA-9910702054803321
Washington, : U.S. G.P.O., 2011-
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Stealing the network [[electronic resource] ] : how to own an identity / / Raven Alder ... [et al.] ; Timothy Mullen (Thor), contributing author and technical editor; Johnny Long, contributing author and technical editor
Stealing the network [[electronic resource] ] : how to own an identity / / Raven Alder ... [et al.] ; Timothy Mullen (Thor), contributing author and technical editor; Johnny Long, contributing author and technical editor
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress
Descrizione fisica 1 online resource (361 p.)
Disciplina 005.8
Altri autori (Persone) AlderRaven
LongJohnny
MullenTimothy M
Collana Stealing the network series
Soggetto topico Computer crimes
Computer hackers
Computer hackers - Psychology
Computer security
Identity theft
Soggetto genere / forma Electronic books.
ISBN 1-299-14930-8
1-281-01990-9
9786611019907
0-08-051774-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Foreword; From the Diary of Robert Knoll, Senior; In The Beginning...; Sins of the Father; Saul On the Run; The Seventh Wave; Bl@ckTo\/\/3r; The Java Script Café; Death by a Thousand Cuts; A Really Gullible Genius Makes Amends; Near Miss; There's Something Else; The Chase; The Conversation; Social Insecurity; Related Titles
Record Nr. UNINA-9910450490103321
Rockland, MA, : Syngress
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Stealing the network [[electronic resource] ] : how to own an identity / / Raven Alder ... [et al.] ; Timothy Mullen (Thor), contributing author and technical editor; Johnny Long, contributing author and technical editor
Stealing the network [[electronic resource] ] : how to own an identity / / Raven Alder ... [et al.] ; Timothy Mullen (Thor), contributing author and technical editor; Johnny Long, contributing author and technical editor
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress
Descrizione fisica 1 online resource (361 p.)
Disciplina 005.8
Altri autori (Persone) AlderRaven
LongJohnny
MullenTimothy M
Collana Stealing the network series
Soggetto topico Computer crimes
Computer hackers
Computer hackers - Psychology
Computer security
Identity theft
ISBN 1-299-14930-8
1-281-01990-9
9786611019907
0-08-051774-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Foreword; From the Diary of Robert Knoll, Senior; In The Beginning...; Sins of the Father; Saul On the Run; The Seventh Wave; Bl@ckTo\/\/3r; The Java Script Café; Death by a Thousand Cuts; A Really Gullible Genius Makes Amends; Near Miss; There's Something Else; The Chase; The Conversation; Social Insecurity; Related Titles
Record Nr. UNINA-9910783752903321
Rockland, MA, : Syngress
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Stealing the network : how to own an identity / / Raven Alder ... [et al.] ; Timothy Mullen (Thor), contributing author and technical editor; Johnny Long, contributing author and technical editor
Stealing the network : how to own an identity / / Raven Alder ... [et al.] ; Timothy Mullen (Thor), contributing author and technical editor; Johnny Long, contributing author and technical editor
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress
Descrizione fisica 1 online resource (361 p.)
Disciplina 005.8
Altri autori (Persone) AlderRaven
LongJohnny
MullenTimothy M
Collana Stealing the network series
Soggetto topico Computer crimes
Computer hackers
Computer hackers - Psychology
Computer security
Identity theft
ISBN 1-299-14930-8
1-281-01990-9
9786611019907
0-08-051774-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Foreword; From the Diary of Robert Knoll, Senior; In The Beginning...; Sins of the Father; Saul On the Run; The Seventh Wave; Bl@ckTo\/\/3r; The Java Script Café; Death by a Thousand Cuts; A Really Gullible Genius Makes Amends; Near Miss; There's Something Else; The Chase; The Conversation; Social Insecurity; Related Titles
Altri titoli varianti You are who the computer says you are
Record Nr. UNINA-9910810733003321
Rockland, MA, : Syngress
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui