Fighting phishing everything you can do to fight social engineering and phishing

Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Grimes, Roger A. (VerfasserIn), Just, John N. (VerfasserIn)
Weitere Verfasser: Greenley, Ray (ErzählerIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: [Place of publication not identified] Ascent Audio 2024
Ausgabe:[First edition].
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a22000002 4500
001 ZDB-30-ORH-102563012
003 DE-627-1
005 20240429114544.0
007 cr uuu---uuuuu
008 240429s2024 xx |||||o 00| ||eng c
020 |a 9781663734990  |c electronic audio bk.  |9 978-1-6637-3499-0 
020 |a 1663734992  |c electronic audio bk.  |9 1-6637-3499-2 
035 |a (DE-627-1)102563012 
035 |a (DE-599)KEP102563012 
035 |a (ORHE)9781663734990 
035 |a (DE-627-1)102563012 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 364.16/32  |2 23/eng/20240401 
100 1 |a Grimes, Roger A.  |e VerfasserIn  |4 aut 
245 1 0 |a Fighting phishing  |b everything you can do to fight social engineering and phishing  |c Roger A. Grimes with Dr. John N. Just 
250 |a [First edition]. 
264 1 |a [Place of publication not identified]  |b Ascent Audio  |c 2024 
300 |a 1 online resource (1 sound file (11 hr., 43 min.)) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Online resource; title from title details screen (O'Reilly, viewed April 1, 2024) 
520 |a Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. - Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them - Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin - Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading - Develop technology and security policies that protect your organization against the most common types of social engineering and phishing. 
650 0 |a Phishing  |x Prevention 
650 0 |a Computer security 
650 0 |a Electronic mail messages  |x Security measures 
650 4 |a Sécurité informatique 
650 4 |a Courrier électronique ; Sécurité ; Mesures 
650 4 |a Audiobooks 
650 4 |a Livres audio 
700 1 |a Greenley, Ray  |e ErzählerIn  |4 nrt 
700 1 |a Just, John N.  |e VerfasserIn  |4 aut 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781663734990/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-102563012
_version_ 1818767370587471872
adam_text
any_adam_object
author Grimes, Roger A.
Just, John N.
author2 Greenley, Ray
author2_role nrt
author2_variant r g rg
author_facet Grimes, Roger A.
Just, John N.
Greenley, Ray
author_role aut
aut
author_sort Grimes, Roger A.
author_variant r a g ra rag
j n j jn jnj
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)102563012
(DE-599)KEP102563012
(ORHE)9781663734990
dewey-full 364.16/32
dewey-hundreds 300 - Social sciences
dewey-ones 364 - Criminology
dewey-raw 364.16/32
dewey-search 364.16/32
dewey-sort 3364.16 232
dewey-tens 360 - Social problems and services; associations
discipline Rechtswissenschaft
edition [First edition].
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02874nam a22004572 4500</leader><controlfield tag="001">ZDB-30-ORH-102563012</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240429114544.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240429s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781663734990</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">978-1-6637-3499-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1663734992</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">1-6637-3499-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)102563012</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP102563012</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781663734990</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)102563012</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.16/32</subfield><subfield code="2">23/eng/20240401</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Grimes, Roger A.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fighting phishing</subfield><subfield code="b">everything you can do to fight social engineering and phishing</subfield><subfield code="c">Roger A. Grimes with Dr. John N. Just</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Ascent Audio</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 sound file (11 hr., 43 min.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed April 1, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. - Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them - Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin - Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading - Develop technology and security policies that protect your organization against the most common types of social engineering and phishing.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Phishing</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic mail messages</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Courrier électronique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Livres audio</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Greenley, Ray</subfield><subfield code="e">ErzählerIn</subfield><subfield code="4">nrt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Just, John N.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781663734990/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-102563012
illustrated Not Illustrated
indexdate 2024-12-18T08:48:48Z
institution BVB
isbn 9781663734990
1663734992
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (1 sound file (11 hr., 43 min.))
psigel ZDB-30-ORH
publishDate 2024
publishDateSearch 2024
publishDateSort 2024
publisher Ascent Audio
record_format marc
spelling Grimes, Roger A. VerfasserIn aut
Fighting phishing everything you can do to fight social engineering and phishing Roger A. Grimes with Dr. John N. Just
[First edition].
[Place of publication not identified] Ascent Audio 2024
1 online resource (1 sound file (11 hr., 43 min.))
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Online resource; title from title details screen (O'Reilly, viewed April 1, 2024)
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. - Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them - Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin - Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading - Develop technology and security policies that protect your organization against the most common types of social engineering and phishing.
Phishing Prevention
Computer security
Electronic mail messages Security measures
Sécurité informatique
Courrier électronique ; Sécurité ; Mesures
Audiobooks
Livres audio
Greenley, Ray ErzählerIn nrt
Just, John N. VerfasserIn aut
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781663734990/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Grimes, Roger A.
Just, John N.
Fighting phishing everything you can do to fight social engineering and phishing
Phishing Prevention
Computer security
Electronic mail messages Security measures
Sécurité informatique
Courrier électronique ; Sécurité ; Mesures
Audiobooks
Livres audio
title Fighting phishing everything you can do to fight social engineering and phishing
title_auth Fighting phishing everything you can do to fight social engineering and phishing
title_exact_search Fighting phishing everything you can do to fight social engineering and phishing
title_full Fighting phishing everything you can do to fight social engineering and phishing Roger A. Grimes with Dr. John N. Just
title_fullStr Fighting phishing everything you can do to fight social engineering and phishing Roger A. Grimes with Dr. John N. Just
title_full_unstemmed Fighting phishing everything you can do to fight social engineering and phishing Roger A. Grimes with Dr. John N. Just
title_short Fighting phishing
title_sort fighting phishing everything you can do to fight social engineering and phishing
title_sub everything you can do to fight social engineering and phishing
topic Phishing Prevention
Computer security
Electronic mail messages Security measures
Sécurité informatique
Courrier électronique ; Sécurité ; Mesures
Audiobooks
Livres audio
topic_facet Phishing Prevention
Computer security
Electronic mail messages Security measures
Sécurité informatique
Courrier électronique ; Sécurité ; Mesures
Audiobooks
Livres audio
url https://learning.oreilly.com/library/view/-/9781663734990/?ar
work_keys_str_mv AT grimesrogera fightingphishingeverythingyoucandotofightsocialengineeringandphishing
AT greenleyray fightingphishingeverythingyoucandotofightsocialengineeringandphishing
AT justjohnn fightingphishingeverythingyoucandotofightsocialengineeringandphishing