Fighting phishing everything you can do to fight social engineering and phishing
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Place of publication not identified]
Ascent Audio
2024
|
Ausgabe: | [First edition]. |
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-102563012 | ||
003 | DE-627-1 | ||
005 | 20240429114544.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240429s2024 xx |||||o 00| ||eng c | ||
020 | |a 9781663734990 |c electronic audio bk. |9 978-1-6637-3499-0 | ||
020 | |a 1663734992 |c electronic audio bk. |9 1-6637-3499-2 | ||
035 | |a (DE-627-1)102563012 | ||
035 | |a (DE-599)KEP102563012 | ||
035 | |a (ORHE)9781663734990 | ||
035 | |a (DE-627-1)102563012 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 364.16/32 |2 23/eng/20240401 | |
100 | 1 | |a Grimes, Roger A. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Fighting phishing |b everything you can do to fight social engineering and phishing |c Roger A. Grimes with Dr. John N. Just |
250 | |a [First edition]. | ||
264 | 1 | |a [Place of publication not identified] |b Ascent Audio |c 2024 | |
300 | |a 1 online resource (1 sound file (11 hr., 43 min.)) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed April 1, 2024) | ||
520 | |a Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. - Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them - Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin - Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading - Develop technology and security policies that protect your organization against the most common types of social engineering and phishing. | ||
650 | 0 | |a Phishing |x Prevention | |
650 | 0 | |a Computer security | |
650 | 0 | |a Electronic mail messages |x Security measures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Courrier électronique ; Sécurité ; Mesures | |
650 | 4 | |a Audiobooks | |
650 | 4 | |a Livres audio | |
700 | 1 | |a Greenley, Ray |e ErzählerIn |4 nrt | |
700 | 1 | |a Just, John N. |e VerfasserIn |4 aut | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781663734990/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-102563012 |
---|---|
_version_ | 1818767370587471872 |
adam_text | |
any_adam_object | |
author | Grimes, Roger A. Just, John N. |
author2 | Greenley, Ray |
author2_role | nrt |
author2_variant | r g rg |
author_facet | Grimes, Roger A. Just, John N. Greenley, Ray |
author_role | aut aut |
author_sort | Grimes, Roger A. |
author_variant | r a g ra rag j n j jn jnj |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)102563012 (DE-599)KEP102563012 (ORHE)9781663734990 |
dewey-full | 364.16/32 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.16/32 |
dewey-search | 364.16/32 |
dewey-sort | 3364.16 232 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02874nam a22004572 4500</leader><controlfield tag="001">ZDB-30-ORH-102563012</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240429114544.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240429s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781663734990</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">978-1-6637-3499-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1663734992</subfield><subfield code="c">electronic audio bk.</subfield><subfield code="9">1-6637-3499-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)102563012</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP102563012</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781663734990</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)102563012</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.16/32</subfield><subfield code="2">23/eng/20240401</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Grimes, Roger A.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fighting phishing</subfield><subfield code="b">everything you can do to fight social engineering and phishing</subfield><subfield code="c">Roger A. Grimes with Dr. John N. Just</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Ascent Audio</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 sound file (11 hr., 43 min.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed April 1, 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. - Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them - Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin - Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading - Develop technology and security policies that protect your organization against the most common types of social engineering and phishing.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Phishing</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic mail messages</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Courrier électronique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Audiobooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Livres audio</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Greenley, Ray</subfield><subfield code="e">ErzählerIn</subfield><subfield code="4">nrt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Just, John N.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781663734990/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-102563012 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:48:48Z |
institution | BVB |
isbn | 9781663734990 1663734992 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 sound file (11 hr., 43 min.)) |
psigel | ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Ascent Audio |
record_format | marc |
spelling | Grimes, Roger A. VerfasserIn aut Fighting phishing everything you can do to fight social engineering and phishing Roger A. Grimes with Dr. John N. Just [First edition]. [Place of publication not identified] Ascent Audio 2024 1 online resource (1 sound file (11 hr., 43 min.)) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed April 1, 2024) Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. - Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them - Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin - Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading - Develop technology and security policies that protect your organization against the most common types of social engineering and phishing. Phishing Prevention Computer security Electronic mail messages Security measures Sécurité informatique Courrier électronique ; Sécurité ; Mesures Audiobooks Livres audio Greenley, Ray ErzählerIn nrt Just, John N. VerfasserIn aut TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781663734990/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Grimes, Roger A. Just, John N. Fighting phishing everything you can do to fight social engineering and phishing Phishing Prevention Computer security Electronic mail messages Security measures Sécurité informatique Courrier électronique ; Sécurité ; Mesures Audiobooks Livres audio |
title | Fighting phishing everything you can do to fight social engineering and phishing |
title_auth | Fighting phishing everything you can do to fight social engineering and phishing |
title_exact_search | Fighting phishing everything you can do to fight social engineering and phishing |
title_full | Fighting phishing everything you can do to fight social engineering and phishing Roger A. Grimes with Dr. John N. Just |
title_fullStr | Fighting phishing everything you can do to fight social engineering and phishing Roger A. Grimes with Dr. John N. Just |
title_full_unstemmed | Fighting phishing everything you can do to fight social engineering and phishing Roger A. Grimes with Dr. John N. Just |
title_short | Fighting phishing |
title_sort | fighting phishing everything you can do to fight social engineering and phishing |
title_sub | everything you can do to fight social engineering and phishing |
topic | Phishing Prevention Computer security Electronic mail messages Security measures Sécurité informatique Courrier électronique ; Sécurité ; Mesures Audiobooks Livres audio |
topic_facet | Phishing Prevention Computer security Electronic mail messages Security measures Sécurité informatique Courrier électronique ; Sécurité ; Mesures Audiobooks Livres audio |
url | https://learning.oreilly.com/library/view/-/9781663734990/?ar |
work_keys_str_mv | AT grimesrogera fightingphishingeverythingyoucandotofightsocialengineeringandphishing AT greenleyray fightingphishingeverythingyoucandotofightsocialengineeringandphishing AT justjohnn fightingphishingeverythingyoucandotofightsocialengineeringandphishing |