語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Effective strategies for combatting social engineering in cybersecurity
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Effective strategies for combatting social engineering in cybersecurity/ Rajeev Kumar, Saurabh Srivastava, Ahmed A. Elngar, editors.
其他作者:
Elngar, Ahmed A.
出版者:
Hershey, Pennsylvania :IGI Global Scientific Publishing, : 2025.,
面頁冊數:
1 online resource (xxi, 428 p.) :ill. :
標題:
Social engineering. -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-6665-3
ISBN:
9798369366677
Effective strategies for combatting social engineering in cybersecurity
Effective strategies for combatting social engineering in cybersecurity
[electronic resource] /Rajeev Kumar, Saurabh Srivastava, Ahmed A. Elngar, editors. - Hershey, Pennsylvania :IGI Global Scientific Publishing,2025. - 1 online resource (xxi, 428 p.) :ill. - Advances in information security, privacy, and ethics (AISPE) book series. - Advances in information security, privacy, and ethics (AISPE) book series..
Includes bibliographical references and index.
Preface -- Chapter 1. Sentiment-Based Summarization of Legal Documents Using Natural Language Processing (NLP) Techniques -- Chapter 2. Exploring Social Engineering Attacks Involving Insights From Case Studies -- Chapter 3. Social Engineering in the Digital Age: A Critical Examination of Attack Techniques, Consequences, and Preventative Measures -- Chapter 4. Cybersecurity in the Age of Social Engineering: Implementing Effective Defense Strategies -- Chapter 5. Exploration of Social Engineering in the Digital Era of Stealth -- Chapter 6. Empowering Cyber Resilience: Effective Strategies for Combating Social Engineering Threats -- Chapter 7. Securing the Weakest Link: Compressive Approaches to Social Engineering Attack Prevention -- Chapter 8. Protecting Against Social Engineering Using Wireshark: Effective Strategies With Real-World Examples -- Chapter 9. Emerging Trends and Future Directions in Social Engineering Defense -- Chapter 10. Exploring the Future Landscape: Emerging Trends in Social Engineering Defense -- Chapter 11. A Comprehensive Guide to Blockchain Technology and Its Role in Enhancing Cyber Security and Combating Social Engineering -- Chapter 12. Social Engineering in Social Media and Online Interactions -- Chapter 13. The Use of Deep Fakes in Social Engineering Attacks: A Case Study on Social Media Engagements -- Chapter 14. The Rising Threat of Deepfake Technology and Frightening Advancementsof Social Engineering -- Chapter 15. Phishing Detection System Using Machine Learning -- Chapter 16. Assortment of Social Engineering Attacks in the New Digital Era -- Compilation of References -- About the Contributors -- Index.
Effective Strategies for Combatting Social Engineering in Cybersecurity offers a thorough exploration of these challenges, providing a well-rounded approach to understanding and countering social engineering threats. It delves into the theoretical aspects of social engineering, including the psychological principles that drive these attacks, while also offering practical solutions through real-world case studies and applications. By bridging the gap between theory andpractice, the book equips academics, practitioners, and policymakers with actionable strategies to enhance their defenses.
Mode of access: World Wide Web.
ISBN: 9798369366677Subjects--Topical Terms:
1024723
Social engineering.
Subjects--Index Terms:
Attack Techniques.Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: HM668 / .E34 2025eb
Dewey Class. No.: 301
Effective strategies for combatting social engineering in cybersecurity
LDR
:03915nam a2200457 a 4500
001
1168753
006
m o d
007
cr nn |||muauu
008
251230s2025 paua ob 001 0 eng d
020
$a
9798369366677
$q
(ebook)
020
$z
9798369366653
$q
(hardback)
035
$a
(CaBNVSL)slc00007279
035
$a
(OCoLC)1482400472
035
$a
00345243
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
041
0
$a
eng
050
4
$a
HM668
$b
.E34 2025eb
082
0 4
$a
301
$2
23
245
0 0
$a
Effective strategies for combatting social engineering in cybersecurity
$h
[electronic resource] /
$c
Rajeev Kumar, Saurabh Srivastava, Ahmed A. Elngar, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global Scientific Publishing,
$c
2025.
300
$a
1 online resource (xxi, 428 p.) :
$b
ill.
490
1
$a
Advances in information security, privacy, and ethics (AISPE) book series
504
$a
Includes bibliographical references and index.
505
0
$a
Preface -- Chapter 1. Sentiment-Based Summarization of Legal Documents Using Natural Language Processing (NLP) Techniques -- Chapter 2. Exploring Social Engineering Attacks Involving Insights From Case Studies -- Chapter 3. Social Engineering in the Digital Age: A Critical Examination of Attack Techniques, Consequences, and Preventative Measures -- Chapter 4. Cybersecurity in the Age of Social Engineering: Implementing Effective Defense Strategies -- Chapter 5. Exploration of Social Engineering in the Digital Era of Stealth -- Chapter 6. Empowering Cyber Resilience: Effective Strategies for Combating Social Engineering Threats -- Chapter 7. Securing the Weakest Link: Compressive Approaches to Social Engineering Attack Prevention -- Chapter 8. Protecting Against Social Engineering Using Wireshark: Effective Strategies With Real-World Examples -- Chapter 9. Emerging Trends and Future Directions in Social Engineering Defense -- Chapter 10. Exploring the Future Landscape: Emerging Trends in Social Engineering Defense -- Chapter 11. A Comprehensive Guide to Blockchain Technology and Its Role in Enhancing Cyber Security and Combating Social Engineering -- Chapter 12. Social Engineering in Social Media and Online Interactions -- Chapter 13. The Use of Deep Fakes in Social Engineering Attacks: A Case Study on Social Media Engagements -- Chapter 14. The Rising Threat of Deepfake Technology and Frightening Advancementsof Social Engineering -- Chapter 15. Phishing Detection System Using Machine Learning -- Chapter 16. Assortment of Social Engineering Attacks in the New Digital Era -- Compilation of References -- About the Contributors -- Index.
520
3
$a
Effective Strategies for Combatting Social Engineering in Cybersecurity offers a thorough exploration of these challenges, providing a well-rounded approach to understanding and countering social engineering threats. It delves into the theoretical aspects of social engineering, including the psychological principles that drive these attacks, while also offering practical solutions through real-world case studies and applications. By bridging the gap between theory andpractice, the book equips academics, practitioners, and policymakers with actionable strategies to enhance their defenses.
538
$a
Mode of access: World Wide Web.
650
0
$a
Social engineering.
$3
1024723
650
0
$a
Computer security
$x
Social aspects.
$3
1498873
650
0
$a
Business enterprises
$x
Security measures.
$3
566349
650
0
$a
Computer crimes.
$3
564161
653
$a
Attack Techniques.
653
$a
Blockchain Technology.
653
$a
Consequences and Prevention Measures.
653
$a
Cyber Resilience Strategies.
653
$a
Cyber Security.
653
$a
Deep Fakes.
653
$a
Digital Era of Stealth.
653
$a
Effective Defense Strategies.
653
$a
Machine Learning.
653
$a
Online Interactions.
653
$a
Organizational Resilience.
653
$a
Phishing Detection.
653
$a
Social Engineering Attacks.
653
$a
Wireshark Effective Strategies.
655
4
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Elngar, Ahmed A.
$e
editor.
$3
1391517
700
1
$a
Srivastava, Saurabh.
$3
1498787
700
1
$a
Kumar, Rajeev.
$3
1102208
710
2
$a
IGI Global.
$3
805187
776
0 8
$i
Print version:
$z
9798369366653
830
0
$a
Advances in information security, privacy, and ethics (AISPE) book series.
$3
1427689
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-6665-3
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入