000 | 02701nam a22004695i 4500 | ||
---|---|---|---|
001 | 978-1-4939-6457-4 | ||
003 | DE-He213 | ||
005 | 20200420221255.0 | ||
007 | cr nn 008mamaa | ||
008 | 160913s2016 xxu| s |||| 0|eng d | ||
020 |
_a9781493964574 _9978-1-4939-6457-4 |
||
024 | 7 |
_a10.1007/978-1-4939-6457-4 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aUnderstanding Social Engineering Based Scams _h[electronic resource] / _cedited by Markus Jakobsson. |
264 | 1 |
_aNew York, NY : _bSpringer New York : _bImprint: Springer, _c2016. |
|
300 |
_aXVI, 130 p. 51 illus., 18 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aScams and Targeting -- Identifying Scams and Trends -- Predicting Trends -- Persuasion in Scams -- Traditional Countermeasures to Unwanted Email -- Obfuscation in Spam and Scam -- Semantic Analytics of Messages -- Case Study: Sales Scams -- Case Study: Rental Scams -- Case Study: Romance Scams -- Case Study: Business Email Compromise -- Conclusion and Next Steps. | |
520 | _aThis book describes trends in email scams and offers tools and techniques to identify such trends. It also describes automated countermeasures based on an understanding of the type of persuasive methods used by scammers. It reviews both consumer-facing scams and enterprise scams, describing in-depth case studies relating to Craigslist scams and Business Email Compromise Scams. This book provides a good starting point for practitioners, decision makers and researchers in that it includes alternatives and complementary tools to the currently deployed email security tools, with a focus on understanding the metrics of scams. Both professionals working in security and advanced-level students interested in privacy or applications of computer science will find this book a useful reference. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
650 | 2 | 4 | _aData Encryption. |
700 | 1 |
_aJakobsson, Markus. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9781493964550 |
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-1-4939-6457-4 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c52850 _d52850 |