Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Erscheinungsort nicht ermittelbar]
JOHN WILEY
2024
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781394249206/?ar |
Zusammenfassung: | Keep valuable data safe from even the most sophisticated social engineering and phishing attacks Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to individuals. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading Develop technology and security policies that protect your organization against the most common types of social engineering and phishing Anyone looking to defend themselves or their organization from phishing will appreciate the uncommonly comprehensive approach in Fighting Phishing. |
Umfang: | 1 online resource |
ISBN: | 9781394249220 1394249225 9781394249206 |
Internformat
MARC
LEADER | 00000nam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-102562180 | ||
003 | DE-627-1 | ||
005 | 20240429114543.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240429s2024 xx |||||o 00| ||eng c | ||
020 | |a 9781394249220 |c electronic bk. |9 978-1-394-24922-0 | ||
020 | |a 1394249225 |c electronic bk. |9 1-394-24922-5 | ||
020 | |a 9781394249206 |9 978-1-394-24920-6 | ||
035 | |a (DE-627-1)102562180 | ||
035 | |a (DE-599)KEP102562180 | ||
035 | |a (ORHE)9781394249206 | ||
035 | |a (DE-627-1)102562180 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8/7 |2 23/eng/20240223 | |
100 | 1 | |a GRIMES, ROGER A. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a FIGHTING PHISHING |b deploying defense-in-depth to defeat hackers and malware |
264 | 1 | |a [Erscheinungsort nicht ermittelbar] |b JOHN WILEY |c 2024 | |
300 | |a 1 online resource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Keep valuable data safe from even the most sophisticated social engineering and phishing attacks Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to individuals. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading Develop technology and security policies that protect your organization against the most common types of social engineering and phishing Anyone looking to defend themselves or their organization from phishing will appreciate the uncommonly comprehensive approach in Fighting Phishing. | ||
650 | 0 | |a Phishing |x Prevention | |
650 | 0 | |a Computer security | |
650 | 0 | |a Electronic mail messages |x Security measures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Courrier électronique ; Sécurité ; Mesures | |
776 | 1 | |z 1394249209 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1394249209 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781394249206/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-102562180 |
---|---|
_version_ | 1833357138858082304 |
adam_text | |
any_adam_object | |
author | GRIMES, ROGER A. |
author_facet | GRIMES, ROGER A. |
author_role | aut |
author_sort | GRIMES, ROGER A. |
author_variant | r a g ra rag |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)102562180 (DE-599)KEP102562180 (ORHE)9781394249206 |
dewey-full | 005.8/7 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/7 |
dewey-search | 005.8/7 |
dewey-sort | 15.8 17 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02924nam a22004212c 4500</leader><controlfield tag="001">ZDB-30-ORH-102562180</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240429114543.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240429s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394249220</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-394-24922-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1394249225</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-394-24922-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394249206</subfield><subfield code="9">978-1-394-24920-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)102562180</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP102562180</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781394249206</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)102562180</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/7</subfield><subfield code="2">23/eng/20240223</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">GRIMES, ROGER A.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">FIGHTING PHISHING</subfield><subfield code="b">deploying defense-in-depth to defeat hackers and malware</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Erscheinungsort nicht ermittelbar]</subfield><subfield code="b">JOHN WILEY</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Keep valuable data safe from even the most sophisticated social engineering and phishing attacks Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to individuals. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading Develop technology and security policies that protect your organization against the most common types of social engineering and phishing Anyone looking to defend themselves or their organization from phishing will appreciate the uncommonly comprehensive approach in Fighting Phishing.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Phishing</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic mail messages</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Courrier électronique ; Sécurité ; Mesures</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1394249209</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1394249209</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781394249206/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-102562180 |
illustrated | Not Illustrated |
indexdate | 2025-05-28T09:46:56Z |
institution | BVB |
isbn | 9781394249220 1394249225 9781394249206 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | JOHN WILEY |
record_format | marc |
spelling | GRIMES, ROGER A. VerfasserIn aut FIGHTING PHISHING deploying defense-in-depth to defeat hackers and malware [Erscheinungsort nicht ermittelbar] JOHN WILEY 2024 1 online resource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Keep valuable data safe from even the most sophisticated social engineering and phishing attacks Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to individuals. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading Develop technology and security policies that protect your organization against the most common types of social engineering and phishing Anyone looking to defend themselves or their organization from phishing will appreciate the uncommonly comprehensive approach in Fighting Phishing. Phishing Prevention Computer security Electronic mail messages Security measures Sécurité informatique Courrier électronique ; Sécurité ; Mesures 1394249209 Erscheint auch als Druck-Ausgabe 1394249209 |
spellingShingle | GRIMES, ROGER A. FIGHTING PHISHING deploying defense-in-depth to defeat hackers and malware Phishing Prevention Computer security Electronic mail messages Security measures Sécurité informatique Courrier électronique ; Sécurité ; Mesures |
title | FIGHTING PHISHING deploying defense-in-depth to defeat hackers and malware |
title_auth | FIGHTING PHISHING deploying defense-in-depth to defeat hackers and malware |
title_exact_search | FIGHTING PHISHING deploying defense-in-depth to defeat hackers and malware |
title_full | FIGHTING PHISHING deploying defense-in-depth to defeat hackers and malware |
title_fullStr | FIGHTING PHISHING deploying defense-in-depth to defeat hackers and malware |
title_full_unstemmed | FIGHTING PHISHING deploying defense-in-depth to defeat hackers and malware |
title_short | FIGHTING PHISHING |
title_sort | fighting phishing deploying defense in depth to defeat hackers and malware |
title_sub | deploying defense-in-depth to defeat hackers and malware |
topic | Phishing Prevention Computer security Electronic mail messages Security measures Sécurité informatique Courrier électronique ; Sécurité ; Mesures |
topic_facet | Phishing Prevention Computer security Electronic mail messages Security measures Sécurité informatique Courrier électronique ; Sécurité ; Mesures |
work_keys_str_mv | AT grimesrogera fightingphishingdeployingdefenseindepthtodefeathackersandmalware |