Phishing dark waters: the offensive and defensive sides of malicious e-mails Christopher Hadnagy, Michele Fincher.
Material type: TextPublisher: Indianapolis, IN : Wiley, [2015]Copyright date: ©2015Description: xxxii, 192 pages : illustrations ; 23 cmContent type:- text
- unmediated
- volume
- 9781118958476
- 22 364.1632
- HV6773.15.P45 H34 2015
Item type | Current library | Collection | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Books | Tan Tao University General Stacks | Non-fiction | 364.1632 (Browse shelf(Opens below)) | Available | AS-2022-0023 |
Includes bibliographical references and index.
Machine generated contents note: ch. 1 An Introduction to the Wild World of Phishing -- Phishing 101 -- How People Phish -- Examples -- High-Profile Breaches -- Phish in Their Natural Habitat -- Phish with Bigger Teeth -- Spear Phishing -- Summary -- ch. 2 The Psychological Principles of Decision-Making -- Decision-Making: Small Bits -- Cognitive Bias -- Physiological States -- External Factors -- The Bottom Line About Decision-Making -- It Seemed Like a Good Idea at the Time -- How Phishers Bait the Hook -- Introducing the Amygdala -- The Guild of Hijacked Amygdalas -- Putting a Leash on the Amygdala -- Wash, Rinse, Repeat -- Summary -- ch. 3 Influence and Manipulation -- Why the Difference Matters to Us -- How Do I Tell the Difference? -- How Will We Build Rapport with Our Targets? -- How Will Our Targets Feel After They Discover They've Been Tested? -- What Is Our Intent? -- But the Bad Guys Will Use Manipulation ... -- Lies, All Lies -- P Is for Punishment --
There are no comments on this title.