Nederlands
  nl
English
  en
contact veelgestelde vragen
SMB
 
Hoofdkenmerken
Auteur: Cameron H. Malin; Terry Gudaitis; Thomas Holt; Max Kilger
Titel: Deception in the Digital Age
Uitgever: Elsevier S & T
ISBN: 9780124116399
ISBN boekversie: 9780124116306
Prijs: € 55.09
Verschijningsdatum: 30-06-2017
Inhoudelijke kenmerken
Categorie: General
Taal: English
Imprint: Academic Press
Technische kenmerken
Verschijningsvorm: E-book
 

Inhoudsopgave:

\u003cp\u003e\u003ci\u003eDeception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication\u003c/i\u003e\u003cb\u003e \u003c/b\u003eguides readers through the fascinating history and principles of deception—and how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory and narrative bases of misdirection, used to shape the targeted audience’s perceptions and beliefs.\u003c/p\u003e \u003cp\u003eThe text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks—and conversely postmortem insight about attackers—presenting a unique resource that empowers readers to observe, understand and protect against cyber deception tactics.\u003c/p\u003e \u003cp\u003eWritten by information security experts with real-world investigative experience, the text is the most instructional book available on the subject, providing practical guidance to readers with rich literature references, diagrams and examples that enhance the learning process.\u003c/p\u003e\u003cul\u003e \u003cli\u003eDeeply examines the psychology of deception through the lens of misdirection and other techniques used by master magicians\u003c/li\u003e \u003cli\u003eExplores cognitive vulnerabilities that cyber attackers use to exploit human targets\u003c/li\u003e \u003cli\u003eDissects the underpinnings and elements of deception narratives\u003c/li\u003e \u003cli\u003eExamines group dynamics and deception factors in cyber attacker underground markets\u003c/li\u003e \u003cli\u003eProvides deep coverage on how cyber attackers leverage psychological influence techniques in the trajectory of deception strategies\u003c/li\u003e \u003cli\u003eExplores the deception strategies used in today’s threat landscape—phishing, watering hole, scareware and ransomware attacks\u003c/li\u003e \u003cli\u003eGives unprecedented insight into deceptive Internet video communications\u003c/li\u003e \u003cli\u003eDelves into the history and deception pathways of nation-state and cyber terrorism attackers\u003c/li\u003e \u003cli\u003eProvides unique insight into honeypot technologies and strategies\u003c/li\u003e \u003cli\u003eExplores the future of cyber deception\u003c/li\u003e\u003c/ul\u003e
leveringsvoorwaarden privacy statement copyright disclaimer veelgestelde vragen contact
 
Welkom bij Smartbooks