000 02701nam a22004695i 4500
001 978-1-4939-6457-4
003 DE-He213
005 20200420221255.0
007 cr nn 008mamaa
008 160913s2016 xxu| s |||| 0|eng d
020 _a9781493964574
_9978-1-4939-6457-4
024 7 _a10.1007/978-1-4939-6457-4
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.8
_223
245 1 0 _aUnderstanding Social Engineering Based Scams
_h[electronic resource] /
_cedited by Markus Jakobsson.
264 1 _aNew York, NY :
_bSpringer New York :
_bImprint: Springer,
_c2016.
300 _aXVI, 130 p. 51 illus., 18 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aScams and Targeting -- Identifying Scams and Trends -- Predicting Trends -- Persuasion in Scams -- Traditional Countermeasures to Unwanted Email -- Obfuscation in Spam and Scam -- Semantic Analytics of Messages -- Case Study: Sales Scams -- Case Study: Rental Scams -- Case Study: Romance Scams -- Case Study: Business Email Compromise -- Conclusion and Next Steps.
520 _aThis book describes trends in email scams and offers tools and techniques to identify such trends. It also describes automated countermeasures based on an understanding of the type of persuasive methods used by scammers. It reviews both consumer-facing scams and enterprise scams, describing in-depth case studies relating to Craigslist scams and Business Email Compromise Scams. This book provides a good starting point for practitioners, decision makers and researchers in that it includes alternatives and complementary tools to the currently deployed email security tools, with a focus on understanding the metrics of scams. Both professionals working in security and advanced-level students interested in privacy or applications of computer science will find this book a useful reference.
650 0 _aComputer science.
650 0 _aComputer security.
650 0 _aData encryption (Computer science).
650 1 4 _aComputer Science.
650 2 4 _aSystems and Data Security.
650 2 4 _aInformation Systems Applications (incl. Internet).
650 2 4 _aData Encryption.
700 1 _aJakobsson, Markus.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9781493964550
856 4 0 _uhttp://dx.doi.org/10.1007/978-1-4939-6457-4
912 _aZDB-2-SCS
942 _cEBK
999 _c52850
_d52850