Computer fraud casebook [[electronic resource] ] : the bytes that bite / / edited by Joseph T. Wells
| Computer fraud casebook [[electronic resource] ] : the bytes that bite / / edited by Joseph T. Wells |
| Pubbl/distr/stampa | Hoboken, NJ, : Wiley, c2009 |
| Descrizione fisica | 1 online resource (443 p.) |
| Disciplina |
342.5268
363.259680973 |
| Altri autori (Persone) | WellsJoseph T |
| Soggetto topico |
Computer crimes
Computer crimes - Investigation Fraud Fraud investigation |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-119-19741-4
1-282-02794-8 9786612027949 0-470-48892-1 0-470-43648-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
COMPUTER FRAUD CASEBOOK: The Bytes That Bite; Contents; Foreword; Preface; Chapter 1: Just What the Doctor Ordered; Chapter 2: Of Botnets and Bagels: Vaccinating the Hospital against Cybercrime; Chapter 3: Pandora's Box; Chapter 4: Mail-Order Fraud; Chapter 5: Lancelot Gone Missing; Chapter 6: Double Trouble; Chapter 7: Unimaginable Wealth; Chapter 8: Hacked; Chapter 9: Bad Education; Chapter 10: If Only His Nose Could Grow; Chapter 11: Keeping Up with the Jamesons; Chapter 12: Imaginary Satellites; Chapter 13: Never Pass Your Password; Chapter 14: Why Computers and Meth Don't Mix
Chapter 15: Fishing in Dangerous WatersChapter 16: The Man Who Told on Himself; Chapter 17: Triple Threat; Chapter 18: Swiped; Chapter 19: Have Computer, Will Video; Chapter 20: Server, We Have a Problem; Chapter 21: Do It for the Kids; Chapter 22: Moving Money; Chapter 23: Operation: Overnight Identity Theft; Chapter 24: The Karma of Fraud; Chapter 25: Secret Shopper; Chapter 26: Would You Like a Receipt?; Chapter 27: The Coupon Code Crooks; Chapter 28: He Fought the Law; Chapter 30: French Connections; Chapter 31: Irreconcilable Differences; Chapter 32: Keeping It In the Family Chapter 33: I DueChapter 34: What Lies Inside the Trojan Horse; Chapter 35: Lost in Transition; Chapter 36: Superhero Syndrome; Chapter 37: Stealing for the Sale; Chapter 38: Do as I Say, Not as I Do; Chapter 39: Cinderella: One Glass Slipper Just Wasn't Enough; Chapter 40: Bloggers: Separating the Wheat from the Chaff; Chapter 41: The Campus Con; Chapter 42: One for You, One for Me: A Tale of Crooked Insurance; Index |
| Record Nr. | UNINA-9910145951203321 |
| Hoboken, NJ, : Wiley, c2009 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer fraud casebook [[electronic resource] ] : the bytes that bite / / edited by Joseph T. Wells
| Computer fraud casebook [[electronic resource] ] : the bytes that bite / / edited by Joseph T. Wells |
| Pubbl/distr/stampa | Hoboken, NJ, : Wiley, c2009 |
| Descrizione fisica | 1 online resource (443 p.) |
| Disciplina |
342.5268
363.259680973 |
| Altri autori (Persone) | WellsJoseph T |
| Soggetto topico |
Computer crimes
Computer crimes - Investigation Fraud Fraud investigation |
| ISBN |
1-119-19741-4
1-282-02794-8 9786612027949 0-470-48892-1 0-470-43648-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
COMPUTER FRAUD CASEBOOK: The Bytes That Bite; Contents; Foreword; Preface; Chapter 1: Just What the Doctor Ordered; Chapter 2: Of Botnets and Bagels: Vaccinating the Hospital against Cybercrime; Chapter 3: Pandora's Box; Chapter 4: Mail-Order Fraud; Chapter 5: Lancelot Gone Missing; Chapter 6: Double Trouble; Chapter 7: Unimaginable Wealth; Chapter 8: Hacked; Chapter 9: Bad Education; Chapter 10: If Only His Nose Could Grow; Chapter 11: Keeping Up with the Jamesons; Chapter 12: Imaginary Satellites; Chapter 13: Never Pass Your Password; Chapter 14: Why Computers and Meth Don't Mix
Chapter 15: Fishing in Dangerous WatersChapter 16: The Man Who Told on Himself; Chapter 17: Triple Threat; Chapter 18: Swiped; Chapter 19: Have Computer, Will Video; Chapter 20: Server, We Have a Problem; Chapter 21: Do It for the Kids; Chapter 22: Moving Money; Chapter 23: Operation: Overnight Identity Theft; Chapter 24: The Karma of Fraud; Chapter 25: Secret Shopper; Chapter 26: Would You Like a Receipt?; Chapter 27: The Coupon Code Crooks; Chapter 28: He Fought the Law; Chapter 30: French Connections; Chapter 31: Irreconcilable Differences; Chapter 32: Keeping It In the Family Chapter 33: I DueChapter 34: What Lies Inside the Trojan Horse; Chapter 35: Lost in Transition; Chapter 36: Superhero Syndrome; Chapter 37: Stealing for the Sale; Chapter 38: Do as I Say, Not as I Do; Chapter 39: Cinderella: One Glass Slipper Just Wasn't Enough; Chapter 40: Bloggers: Separating the Wheat from the Chaff; Chapter 41: The Campus Con; Chapter 42: One for You, One for Me: A Tale of Crooked Insurance; Index |
| Record Nr. | UNINA-9910829837803321 |
| Hoboken, NJ, : Wiley, c2009 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer fraud casebook : the bytes that bite / / edited by Joseph T. Wells
| Computer fraud casebook : the bytes that bite / / edited by Joseph T. Wells |
| Pubbl/distr/stampa | Hoboken, NJ, : Wiley, c2009 |
| Descrizione fisica | 1 online resource (443 p.) |
| Disciplina |
342.5268
363.259680973 |
| Altri autori (Persone) | WellsJoseph T |
| Soggetto topico |
Computer crimes
Computer crimes - Investigation Fraud Fraud investigation |
| ISBN |
9786612027949
9781119197416 1119197414 9781282027947 1282027948 9780470488928 0470488921 9780470436486 0470436484 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
COMPUTER FRAUD CASEBOOK: The Bytes That Bite; Contents; Foreword; Preface; Chapter 1: Just What the Doctor Ordered; Chapter 2: Of Botnets and Bagels: Vaccinating the Hospital against Cybercrime; Chapter 3: Pandora's Box; Chapter 4: Mail-Order Fraud; Chapter 5: Lancelot Gone Missing; Chapter 6: Double Trouble; Chapter 7: Unimaginable Wealth; Chapter 8: Hacked; Chapter 9: Bad Education; Chapter 10: If Only His Nose Could Grow; Chapter 11: Keeping Up with the Jamesons; Chapter 12: Imaginary Satellites; Chapter 13: Never Pass Your Password; Chapter 14: Why Computers and Meth Don't Mix
Chapter 15: Fishing in Dangerous WatersChapter 16: The Man Who Told on Himself; Chapter 17: Triple Threat; Chapter 18: Swiped; Chapter 19: Have Computer, Will Video; Chapter 20: Server, We Have a Problem; Chapter 21: Do It for the Kids; Chapter 22: Moving Money; Chapter 23: Operation: Overnight Identity Theft; Chapter 24: The Karma of Fraud; Chapter 25: Secret Shopper; Chapter 26: Would You Like a Receipt?; Chapter 27: The Coupon Code Crooks; Chapter 28: He Fought the Law; Chapter 30: French Connections; Chapter 31: Irreconcilable Differences; Chapter 32: Keeping It In the Family Chapter 33: I DueChapter 34: What Lies Inside the Trojan Horse; Chapter 35: Lost in Transition; Chapter 36: Superhero Syndrome; Chapter 37: Stealing for the Sale; Chapter 38: Do as I Say, Not as I Do; Chapter 39: Cinderella: One Glass Slipper Just Wasn't Enough; Chapter 40: Bloggers: Separating the Wheat from the Chaff; Chapter 41: The Campus Con; Chapter 42: One for You, One for Me: A Tale of Crooked Insurance; Index |
| Record Nr. | UNINA-9911019242503321 |
| Hoboken, NJ, : Wiley, c2009 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Phishing dark waters : the offensive and defensive sides of malicious e-mails / / Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke
| Phishing dark waters : the offensive and defensive sides of malicious e-mails / / Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke |
| Autore | Hadnagy Christopher |
| Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , [2015] |
| Descrizione fisica | 1 online resource (227 p.) |
| Disciplina |
363.25
363.259680973 |
| Soggetto topico |
Phishing
Identity theft |
| ISBN | 1-118-95849-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Chapter 1 An Introduction to the Wild World of Phishing; Phishing 101; How People Phish; Examples; High-Profile Breaches; Phish in Their Natural Habitat; Phish with Bigger Teeth; Spear Phishing; Summary; Chapter 2 The Psychological Principles of Decision-Making; Decision-Making: Small Bits; Cognitive Bias; Physiological States; External Factors; The Bottom Line About Decision-Making; It Seemed Like a Good Idea at the Time; How Phishers Bait the Hook; Introducing the Amygdala; The Guild of Hijacked Amygdalas; Putting a Leash on the Amygdala
Wash, Rinse, RepeatSummary; Chapter 3 Influence and Manipulation; Why the Difference Matters to Us; How Do I Tell the Difference?; How Will We Build Rapport with Our Targets?; How Will Our Targets Feel After They Discover They've Been Tested?; What Is Our Intent?; But the Bad Guys Will Use Manipulation . . .; Lies, All Lies; P Is for Punishment; Principles of Influence; Reciprocity; Obligation; Concession; Scarcity; Authority; Consistency and Commitment; Liking; Social Proof; More Fun with Influence; Our Social Nature; Physiological Response; Psychological Response Things to Know About ManipulationSummary; Chapter 4 Lessons in Protection; Lesson One: Critical Thinking; How Can Attackers Bypass This Method?; Lesson Two: Learn to Hover; What If I Already Clicked the Link and I Think It's Dangerous?; How Can Attackers Bypass This Method?; Lesson Three: URL Deciphering; How Can Attackers Bypass This Method?; Lesson Four: Analyzing E-mail Headers; How Can Attackers Bypass This Method?; Lesson Five: Sandboxing; How Can Attackers Bypass This Method?; The "Wall of Sheep," or a Net of Bad Ideas; Copy and Paste Your Troubles Away; Sharing Is Caring My Mobile Is SecureA Good Antivirus Program Will Save You; Summary; Chapter 5 Plan Your Phishing Trip: Creating the Enterprise Phishing Program; The Basic Recipe; Why?; What's the Theme?; The Big, Fat, Not-So-Legal Section; Developing the Program; Setting a Baseline; Setting the Difficulty Level; Writing the Phish; Tracking and Statistics; Reporting; Phish, Educate, Repeat; Summary; Chapter 6 The Good, the Bad, and the Ugly: Policies and More; Oh, the Feels: Emotion and Policies; The Definition; The Bad; Making It "Good"; The Boss Is Exempt; The Definition; The Bad; Making It "Good" I'll Just Patch One of the HolesThe Definition; The Bad; Making It "Good"; Phish Just Enough to Hate It; The Definition; The Bad; Making It "Good"; If You Spot a Phish, Call This Number; The Definition; The Bad; Making It "Good"; The Bad Guys Take Mondays Off; The Definition; The Bad; Making It "Good"; If You Can't See It, You Are Safe; The Definition; The Bad; Making It "Good"; The Lesson for Us All; Summary; Chapter 7 The Professional Phisher's Tackle Bag; Commercial Applications; Rapid7 Metasploit Pro; ThreatSim; PhishMe; Wombat PhishGuru; PhishLine; Open Source Applications SET: Social-Engineer Toolkit |
| Record Nr. | UNINA-9910131151303321 |
Hadnagy Christopher
|
||
| Indianapolis, Indiana : , : Wiley, , [2015] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Phishing dark waters : the offensive and defensive sides of malicious e-mails / / Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke
| Phishing dark waters : the offensive and defensive sides of malicious e-mails / / Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke |
| Autore | Hadnagy Christopher |
| Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , [2015] |
| Descrizione fisica | 1 online resource (227 p.) |
| Disciplina |
363.25
363.259680973 |
| Soggetto topico |
Phishing
Identity theft |
| ISBN | 1-118-95849-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Chapter 1 An Introduction to the Wild World of Phishing; Phishing 101; How People Phish; Examples; High-Profile Breaches; Phish in Their Natural Habitat; Phish with Bigger Teeth; Spear Phishing; Summary; Chapter 2 The Psychological Principles of Decision-Making; Decision-Making: Small Bits; Cognitive Bias; Physiological States; External Factors; The Bottom Line About Decision-Making; It Seemed Like a Good Idea at the Time; How Phishers Bait the Hook; Introducing the Amygdala; The Guild of Hijacked Amygdalas; Putting a Leash on the Amygdala
Wash, Rinse, RepeatSummary; Chapter 3 Influence and Manipulation; Why the Difference Matters to Us; How Do I Tell the Difference?; How Will We Build Rapport with Our Targets?; How Will Our Targets Feel After They Discover They've Been Tested?; What Is Our Intent?; But the Bad Guys Will Use Manipulation . . .; Lies, All Lies; P Is for Punishment; Principles of Influence; Reciprocity; Obligation; Concession; Scarcity; Authority; Consistency and Commitment; Liking; Social Proof; More Fun with Influence; Our Social Nature; Physiological Response; Psychological Response Things to Know About ManipulationSummary; Chapter 4 Lessons in Protection; Lesson One: Critical Thinking; How Can Attackers Bypass This Method?; Lesson Two: Learn to Hover; What If I Already Clicked the Link and I Think It's Dangerous?; How Can Attackers Bypass This Method?; Lesson Three: URL Deciphering; How Can Attackers Bypass This Method?; Lesson Four: Analyzing E-mail Headers; How Can Attackers Bypass This Method?; Lesson Five: Sandboxing; How Can Attackers Bypass This Method?; The "Wall of Sheep," or a Net of Bad Ideas; Copy and Paste Your Troubles Away; Sharing Is Caring My Mobile Is SecureA Good Antivirus Program Will Save You; Summary; Chapter 5 Plan Your Phishing Trip: Creating the Enterprise Phishing Program; The Basic Recipe; Why?; What's the Theme?; The Big, Fat, Not-So-Legal Section; Developing the Program; Setting a Baseline; Setting the Difficulty Level; Writing the Phish; Tracking and Statistics; Reporting; Phish, Educate, Repeat; Summary; Chapter 6 The Good, the Bad, and the Ugly: Policies and More; Oh, the Feels: Emotion and Policies; The Definition; The Bad; Making It "Good"; The Boss Is Exempt; The Definition; The Bad; Making It "Good" I'll Just Patch One of the HolesThe Definition; The Bad; Making It "Good"; Phish Just Enough to Hate It; The Definition; The Bad; Making It "Good"; If You Spot a Phish, Call This Number; The Definition; The Bad; Making It "Good"; The Bad Guys Take Mondays Off; The Definition; The Bad; Making It "Good"; If You Can't See It, You Are Safe; The Definition; The Bad; Making It "Good"; The Lesson for Us All; Summary; Chapter 7 The Professional Phisher's Tackle Bag; Commercial Applications; Rapid7 Metasploit Pro; ThreatSim; PhishMe; Wombat PhishGuru; PhishLine; Open Source Applications SET: Social-Engineer Toolkit |
| Record Nr. | UNINA-9910812405503321 |
Hadnagy Christopher
|
||
| Indianapolis, Indiana : , : Wiley, , [2015] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||