語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Effective strategies for combatting social engineering in cybersecurity
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Effective strategies for combatting social engineering in cybersecurityRajeev Kumar, Saurabh Srivastava, Ahmed A. Elngar, editors.
其他作者:
Elngar, Ahmed A.
出版者:
Hershey, Pennsylvania :IGI Global Scientific Publishing,2025.
面頁冊數:
1 online resource (xxi, 428 p.) :ill.
標題:
Social engineering.
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-6665-3
ISBN:
9798369366677
Effective strategies for combatting social engineering in cybersecurity
Effective strategies for combatting social engineering in cybersecurity
[electronic resource] /Rajeev Kumar, Saurabh Srivastava, Ahmed A. Elngar, editors. - Hershey, Pennsylvania :IGI Global Scientific Publishing,2025. - 1 online resource (xxi, 428 p.) :ill. - Advances in information security, privacy, and ethics (AISPE) book series. - Advances in information security, privacy, and ethics (AISPE) book series..
Includes bibliographical references and index.
Preface -- Chapter 1. Sentiment-Based Summarization of Legal Documents Using Natural Language Processing (NLP) Techniques -- Chapter 2. Exploring Social Engineering Attacks Involving Insights From Case Studies -- Chapter 3. Social Engineering in the Digital Age: A Critical Examination of Attack Techniques, Consequences, and Preventative Measures -- Chapter 4. Cybersecurity in the Age of Social Engineering: Implementing Effective Defense Strategies -- Chapter 5. Exploration of Social Engineering in the Digital Era of Stealth -- Chapter 6. Empowering Cyber Resilience: Effective Strategies for Combating Social Engineering Threats -- Chapter 7. Securing the Weakest Link: Compressive Approaches to Social Engineering Attack Prevention -- Chapter 8. Protecting Against Social Engineering Using Wireshark: Effective Strategies With Real-World Examples -- Chapter 9. Emerging Trends and Future Directions in Social Engineering Defense -- Chapter 10. Exploring the Future Landscape: Emerging Trends in Social Engineering Defense -- Chapter 11. A Comprehensive Guide to Blockchain Technology and Its Role in Enhancing Cyber Security and Combating Social Engineering -- Chapter 12. Social Engineering in Social Media and Online Interactions -- Chapter 13. The Use of Deep Fakes in Social Engineering Attacks: A Case Study on Social Media Engagements -- Chapter 14. The Rising Threat of Deepfake Technology and Frightening Advancementsof Social Engineering -- Chapter 15. Phishing Detection System Using Machine Learning -- Chapter 16. Assortment of Social Engineering Attacks in the New Digital Era -- Compilation of References -- About the Contributors -- Index.
Effective Strategies for Combatting Social Engineering in Cybersecurity offers a thorough exploration of these challenges, providing a well-rounded approach to understanding and countering social engineering threats. It delves into the theoretical aspects of social engineering, including the psychological principles that drive these attacks, while also offering practical solutions through real-world case studies and applications. By bridging the gap between theory andpractice, the book equips academics, practitioners, and policymakers with actionable strategies to enhance their defenses.
Mode of access: World Wide Web.
ISBN: 9798369366677Subjects--Topical Terms:
679481
Social engineering.
Subjects--Index Terms:
Attack Techniques.Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: HM668 / .E34 2025eb
Dewey Class. No.: 301
Effective strategies for combatting social engineering in cybersecurity
LDR
:03916nmm a2200457 a 4500
001
681680
006
m o d
007
cr nn |||muauu
008
251124s2025 paua ob 001 0 eng d
020
$a
9798369366677
$q
(ebook)
020
$z
9798369366653
$q
(hardback)
035
$a
(CaBNVSL)slc00007279
035
$a
(OCoLC)1482400472
035
$a
00345243
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
041
0
$a
eng
050
4
$a
HM668
$b
.E34 2025eb
082
0 4
$a
301
$2
23
245
0 0
$a
Effective strategies for combatting social engineering in cybersecurity
$h
[electronic resource] /
$c
Rajeev Kumar, Saurabh Srivastava, Ahmed A. Elngar, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global Scientific Publishing,
$c
2025.
300
$a
1 online resource (xxi, 428 p.) :
$b
ill.
490
1
$a
Advances in information security, privacy, and ethics (AISPE) book series
504
$a
Includes bibliographical references and index.
505
0
$a
Preface -- Chapter 1. Sentiment-Based Summarization of Legal Documents Using Natural Language Processing (NLP) Techniques -- Chapter 2. Exploring Social Engineering Attacks Involving Insights From Case Studies -- Chapter 3. Social Engineering in the Digital Age: A Critical Examination of Attack Techniques, Consequences, and Preventative Measures -- Chapter 4. Cybersecurity in the Age of Social Engineering: Implementing Effective Defense Strategies -- Chapter 5. Exploration of Social Engineering in the Digital Era of Stealth -- Chapter 6. Empowering Cyber Resilience: Effective Strategies for Combating Social Engineering Threats -- Chapter 7. Securing the Weakest Link: Compressive Approaches to Social Engineering Attack Prevention -- Chapter 8. Protecting Against Social Engineering Using Wireshark: Effective Strategies With Real-World Examples -- Chapter 9. Emerging Trends and Future Directions in Social Engineering Defense -- Chapter 10. Exploring the Future Landscape: Emerging Trends in Social Engineering Defense -- Chapter 11. A Comprehensive Guide to Blockchain Technology and Its Role in Enhancing Cyber Security and Combating Social Engineering -- Chapter 12. Social Engineering in Social Media and Online Interactions -- Chapter 13. The Use of Deep Fakes in Social Engineering Attacks: A Case Study on Social Media Engagements -- Chapter 14. The Rising Threat of Deepfake Technology and Frightening Advancementsof Social Engineering -- Chapter 15. Phishing Detection System Using Machine Learning -- Chapter 16. Assortment of Social Engineering Attacks in the New Digital Era -- Compilation of References -- About the Contributors -- Index.
520
3
$a
Effective Strategies for Combatting Social Engineering in Cybersecurity offers a thorough exploration of these challenges, providing a well-rounded approach to understanding and countering social engineering threats. It delves into the theoretical aspects of social engineering, including the psychological principles that drive these attacks, while also offering practical solutions through real-world case studies and applications. By bridging the gap between theory andpractice, the book equips academics, practitioners, and policymakers with actionable strategies to enhance their defenses.
538
$a
Mode of access: World Wide Web.
650
0
$a
Social engineering.
$3
679481
650
0
$a
Computer security
$x
Social aspects.
$3
995302
650
0
$a
Business enterprises
$x
Security measures.
$3
267591
650
0
$a
Computer crimes.
$3
245152
653
$a
Attack Techniques.
653
$a
Blockchain Technology.
653
$a
Consequences and Prevention Measures.
653
$a
Cyber Resilience Strategies.
653
$a
Cyber Security.
653
$a
Deep Fakes.
653
$a
Digital Era of Stealth.
653
$a
Effective Defense Strategies.
653
$a
Machine Learning.
653
$a
Online Interactions.
653
$a
Organizational Resilience.
653
$a
Phishing Detection.
653
$a
Social Engineering Attacks.
653
$a
Wireshark Effective Strategies.
655
4
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Elngar, Ahmed A.
$3
976738
700
1
$a
Srivastava, Saurabh.
$3
995215
700
1
$a
Kumar, Rajeev.
$3
737242
710
2
$a
IGI Global.
$3
529832
776
0 8
$i
Print version:
$z
9798369366653
830
0
$a
Advances in information security, privacy, and ethics (AISPE) book series.
$3
795907
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-6665-3
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000254769
電子館藏
1圖書
電子書
EB HM668 .E34 2025eb 2025
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-6665-3
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入