Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Critical phishing defense strategies...
~
Gupta, Brij B., (1982-)
Critical phishing defense strategies and digital asset protection
Record Type:
Electronic resources : Monograph/item
Title/Author:
Critical phishing defense strategies and digital asset protectionBrij B. Gupta, editor.
other author:
Gupta, Brij B.,
Published:
Hershey, Pennsylvania :IGI Global Scientific Publishing,2025.
Description:
1 online resource (xviii, 416 p.) :ill.
Subject:
PhishingPrevention.
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-8784-9
ISBN:
9798369387863$q(ebook)
Critical phishing defense strategies and digital asset protection
Critical phishing defense strategies and digital asset protection
[electronic resource] /Brij B. Gupta, editor. - Hershey, Pennsylvania :IGI Global Scientific Publishing,2025. - 1 online resource (xviii, 416 p.) :ill.
Includes bibliographic references and index.
Foreword -- Preface -- Chapter 1. Foundations of Phishing Defense: Comprehensive Strategies for Digital Asset Protection -- Chapter 2. Phishing Detection Methods -- Chapter 3. Phishing Prevention Solutions and Mechanisms -- Chapter 4. Phishing Detection and Prevention in Smart Devices and IoT Networks -- Chapter 5. Defending Against Phishing Attacks on Social Media: A Multi-Layered, User-Driven Security Solution -- Chapter 6. Phishing Attack Response and Risk Mitigation Using Deep Learning and Machine Learning -- Chapter 7. Anti-Phishing Technologies and Tools -- Chapter 8. Advanced Techniques and Best Practices for Phishing Detection -- Chapter 9. Advanced Tools and Technologies for Phishing Prevention-- Chapter 10. Critical Phishing Defense Strategies and Digital Asset Protection: The Role of Cryptography in Protecting Digital Asset -- Chapter 11. Critical Strategies for Phishing Defense and Digital Asset Protection: A Case Study Approach -- Chapter 12. Optimizing Data Privacy and Scalability in Health Monitoring: Leveraging, Encryption, Blockchain, and Cloud Technologies -- Chapter 13. Cyber Security in the Context of Cloud Computing: An Empirical Study of Australian SMEs -- Chapter 14. Advanced Deep Learning Frameworks for Cyber Security in IoT-Based Healthcare -- Chapter 15. Cybersecurity in the Age of AI-Enhancing Defences for Today's Threats -- Chapter 16. Psychological Triggers in Phishing Attacks: AConceptual Analysis for Improved Defence Strategies -- Compilation of References -- About the Contributors -- Index.
"This book covers the fundamentals of phishing, including common tactics and techniques used by attackers. It then progresses to explore advanced detection and prevention methods, offering practical solutions and best practices for defending against these malicious activities"--
Mode of access: World Wide Web.
ISBN: 9798369387863$q(ebook)Subjects--Topical Terms:
920456
Phishing
--Prevention.Subjects--Index Terms:
Cryptography.Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: HV6773.15.P45 / C75 2025eb
Dewey Class. No.: 364.16/32
Critical phishing defense strategies and digital asset protection
LDR
:03290nmm a2200433 a 4500
001
681667
006
m o d
007
cr nn |||muauu
008
251124s2025 paua ob 001 0 eng d
020
$a
9798369387863$q(ebook)
020
$z
9798369387849$q(hardback)
020
$z
9798369387856$q(paperback)
035
$a
(CaBNVSL)slc00007523
035
$a
(OCoLC)1503926165
035
$a
00352518
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
041
0
$a
eng
050
4
$a
HV6773.15.P45
$b
C75 2025eb
082
0 4
$a
364.16/32
$2
23
245
0 0
$a
Critical phishing defense strategies and digital asset protection
$h
[electronic resource] /
$c
Brij B. Gupta, editor.
260
$a
Hershey, Pennsylvania :
$b
IGI Global Scientific Publishing,
$c
2025.
300
$a
1 online resource (xviii, 416 p.) :
$b
ill.
504
$a
Includes bibliographic references and index.
505
0
$a
Foreword -- Preface -- Chapter 1. Foundations of Phishing Defense: Comprehensive Strategies for Digital Asset Protection -- Chapter 2. Phishing Detection Methods -- Chapter 3. Phishing Prevention Solutions and Mechanisms -- Chapter 4. Phishing Detection and Prevention in Smart Devices and IoT Networks -- Chapter 5. Defending Against Phishing Attacks on Social Media: A Multi-Layered, User-Driven Security Solution -- Chapter 6. Phishing Attack Response and Risk Mitigation Using Deep Learning and Machine Learning -- Chapter 7. Anti-Phishing Technologies and Tools -- Chapter 8. Advanced Techniques and Best Practices for Phishing Detection -- Chapter 9. Advanced Tools and Technologies for Phishing Prevention-- Chapter 10. Critical Phishing Defense Strategies and Digital Asset Protection: The Role of Cryptography in Protecting Digital Asset -- Chapter 11. Critical Strategies for Phishing Defense and Digital Asset Protection: A Case Study Approach -- Chapter 12. Optimizing Data Privacy and Scalability in Health Monitoring: Leveraging, Encryption, Blockchain, and Cloud Technologies -- Chapter 13. Cyber Security in the Context of Cloud Computing: An Empirical Study of Australian SMEs -- Chapter 14. Advanced Deep Learning Frameworks for Cyber Security in IoT-Based Healthcare -- Chapter 15. Cybersecurity in the Age of AI-Enhancing Defences for Today's Threats -- Chapter 16. Psychological Triggers in Phishing Attacks: AConceptual Analysis for Improved Defence Strategies -- Compilation of References -- About the Contributors -- Index.
520
3
$a
"This book covers the fundamentals of phishing, including common tactics and techniques used by attackers. It then progresses to explore advanced detection and prevention methods, offering practical solutions and best practices for defending against these malicious activities"--
$c
Provided by publisher.
538
$a
Mode of access: World Wide Web.
650
0
$a
Phishing
$x
Prevention.
$3
920456
650
0
$a
Computer security.
$3
184416
653
$a
Cryptography.
653
$a
Cybersecurity.
653
$a
Digital Technology.
653
$a
Healthcare Technology.
653
$a
Internet of Things.
653
$a
Machine Learning.
653
$a
Network Security.
653
$a
Phishing Detection and Defense.
653
$a
Risk Mitigation.
653
$a
Smart Devices.
653
$a
Social Media.
653
$a
Threat Detection.
655
4
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Gupta, Brij B.,
$d
1982-
$3
974288
710
2
$a
IGI Global Scientific Publishing.
$3
995061
776
0 8
$i
Print version:
$z
9798369387849
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-8784-9
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000254756
電子館藏
1圖書
電子書
EB HV6773.15.P45 C75 2025eb 2025
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-8784-9
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login