Understanding Social Engineering Based Scams

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Understanding Social Engineering Based Scams by , Springer New York
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781493964574
Publisher: Springer New York Publication: September 13, 2016
Imprint: Springer Language: English
Author:
ISBN: 9781493964574
Publisher: Springer New York
Publication: September 13, 2016
Imprint: Springer
Language: English

This book describes trends in email scams and offers tools and techniques

to identify such trends. It also describes automated countermeasures

based on an understanding of the type of persuasive methods used by

scammers. It reviews both consumer-facing scams and enterprise scams,

describing in-depth case studies relating to Craigslist scams and Business

Email Compromise Scams. This book provides a good starting point for

practitioners, decision makers and researchers in that it includes

alternatives and complementary tools to the currently deployed email

security tools, with a focus on understanding the metrics of scams.

Both professionals working in security and advanced-level students

interested in privacy or applications of computer science will find this book

a useful reference.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book describes trends in email scams and offers tools and techniques

to identify such trends. It also describes automated countermeasures

based on an understanding of the type of persuasive methods used by

scammers. It reviews both consumer-facing scams and enterprise scams,

describing in-depth case studies relating to Craigslist scams and Business

Email Compromise Scams. This book provides a good starting point for

practitioners, decision makers and researchers in that it includes

alternatives and complementary tools to the currently deployed email

security tools, with a focus on understanding the metrics of scams.

Both professionals working in security and advanced-level students

interested in privacy or applications of computer science will find this book

a useful reference.

More books from Springer New York

Cover of the book Cartilage Restoration by
Cover of the book Macromolecular Anticancer Therapeutics by
Cover of the book Reconfigurable Switched-Capacitor Power Converters by
Cover of the book Distributed Medium Access Control in Wireless Networks by
Cover of the book Igniting the Power of Community by
Cover of the book Mucosal Immunology of Acute Bacterial Pneumonia by
Cover of the book Genetics of Colorectal Cancer by
Cover of the book Medical Lasers and Their Safe Use by
Cover of the book ICT Development for Social and Rural Connectedness by
Cover of the book Cross-Calibration of Far UV Spectra of Solar System Objects and the Heliosphere by
Cover of the book A DXA Primer for the Practicing Clinician by
Cover of the book Total-Condylar Knee Arthroplasty by
Cover of the book Vesicle Trafficking in Cancer by
Cover of the book Reviews of Environmental Contamination and Toxicology by
Cover of the book One-dot Theory Described, Explained, Inferred, Justified, and Applied by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy