Understanding Social Engineering Based Scams (Record no. 52850)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02701nam a22004695i 4500 |
001 - CONTROL NUMBER | |
control field | 978-1-4939-6457-4 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200420221255.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 160913s2016 xxu| s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781493964574 |
-- | 978-1-4939-6457-4 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
245 10 - TITLE STATEMENT | |
Title | Understanding Social Engineering Based Scams |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XVI, 130 p. 51 illus., 18 illus. in color. |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Scams and Targeting -- Identifying Scams and Trends -- Predicting Trends -- Persuasion in Scams -- Traditional Countermeasures to Unwanted Email -- Obfuscation in Spam and Scam -- Semantic Analytics of Messages -- Case Study: Sales Scams -- Case Study: Rental Scams -- Case Study: Romance Scams -- Case Study: Business Email Compromise -- Conclusion and Next Steps. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book describes trends in email scams and offers tools and techniques to identify such trends. It also describes automated countermeasures based on an understanding of the type of persuasive methods used by scammers. It reviews both consumer-facing scams and enterprise scams, describing in-depth case studies relating to Craigslist scams and Business Email Compromise Scams. This book provides a good starting point for practitioners, decision makers and researchers in that it includes alternatives and complementary tools to the currently deployed email security tools, with a focus on understanding the metrics of scams. Both professionals working in security and advanced-level students interested in privacy or applications of computer science will find this book a useful reference. |
700 1# - AUTHOR 2 | |
Author 2 | Jakobsson, Markus. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://dx.doi.org/10.1007/978-1-4939-6457-4 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | New York, NY : |
-- | Springer New York : |
-- | Imprint: Springer, |
-- | 2016. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer science. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data encryption (Computer science). |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Science. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Systems and Data Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Information Systems Applications (incl. Internet). |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data Encryption. |
912 ## - | |
-- | ZDB-2-SCS |
No items available.