Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Effective strategies for combatting social engineering in cybersecurity
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Effective strategies for combatting social engineering in cybersecurity/ Rajeev Kumar, Saurabh Srivastava, Ahmed A. Elngar, editors.
other author:
Elngar, Ahmed A.
Published:
Hershey, Pennsylvania :IGI Global Scientific Publishing, : 2025.,
Description:
1 online resource (xxi, 428 p.) :ill. :
Subject:
Social engineering. -
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-6665-3
ISBN:
9798369366677
Effective strategies for combatting social engineering in cybersecurity
Effective strategies for combatting social engineering in cybersecurity
[electronic resource] /Rajeev Kumar, Saurabh Srivastava, Ahmed A. Elngar, editors. - Hershey, Pennsylvania :IGI Global Scientific Publishing,2025. - 1 online resource (xxi, 428 p.) :ill. - Advances in information security, privacy, and ethics (AISPE) book series. - Advances in information security, privacy, and ethics (AISPE) book series..
Includes bibliographical references and index.
Preface -- Chapter 1. Sentiment-Based Summarization of Legal Documents Using Natural Language Processing (NLP) Techniques -- Chapter 2. Exploring Social Engineering Attacks Involving Insights From Case Studies -- Chapter 3. Social Engineering in the Digital Age: A Critical Examination of Attack Techniques, Consequences, and Preventative Measures -- Chapter 4. Cybersecurity in the Age of Social Engineering: Implementing Effective Defense Strategies -- Chapter 5. Exploration of Social Engineering in the Digital Era of Stealth -- Chapter 6. Empowering Cyber Resilience: Effective Strategies for Combating Social Engineering Threats -- Chapter 7. Securing the Weakest Link: Compressive Approaches to Social Engineering Attack Prevention -- Chapter 8. Protecting Against Social Engineering Using Wireshark: Effective Strategies With Real-World Examples -- Chapter 9. Emerging Trends and Future Directions in Social Engineering Defense -- Chapter 10. Exploring the Future Landscape: Emerging Trends in Social Engineering Defense -- Chapter 11. A Comprehensive Guide to Blockchain Technology and Its Role in Enhancing Cyber Security and Combating Social Engineering -- Chapter 12. Social Engineering in Social Media and Online Interactions -- Chapter 13. The Use of Deep Fakes in Social Engineering Attacks: A Case Study on Social Media Engagements -- Chapter 14. The Rising Threat of Deepfake Technology and Frightening Advancementsof Social Engineering -- Chapter 15. Phishing Detection System Using Machine Learning -- Chapter 16. Assortment of Social Engineering Attacks in the New Digital Era -- Compilation of References -- About the Contributors -- Index.
Effective Strategies for Combatting Social Engineering in Cybersecurity offers a thorough exploration of these challenges, providing a well-rounded approach to understanding and countering social engineering threats. It delves into the theoretical aspects of social engineering, including the psychological principles that drive these attacks, while also offering practical solutions through real-world case studies and applications. By bridging the gap between theory andpractice, the book equips academics, practitioners, and policymakers with actionable strategies to enhance their defenses.
Mode of access: World Wide Web.
ISBN: 9798369366677Subjects--Topical Terms:
1024723
Social engineering.
Subjects--Index Terms:
Attack Techniques.Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: HM668 / .E34 2025eb
Dewey Class. No.: 301
Effective strategies for combatting social engineering in cybersecurity
LDR
:03915nam a2200457 a 4500
001
1168753
006
m o d
007
cr nn |||muauu
008
251230s2025 paua ob 001 0 eng d
020
$a
9798369366677
$q
(ebook)
020
$z
9798369366653
$q
(hardback)
035
$a
(CaBNVSL)slc00007279
035
$a
(OCoLC)1482400472
035
$a
00345243
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
041
0
$a
eng
050
4
$a
HM668
$b
.E34 2025eb
082
0 4
$a
301
$2
23
245
0 0
$a
Effective strategies for combatting social engineering in cybersecurity
$h
[electronic resource] /
$c
Rajeev Kumar, Saurabh Srivastava, Ahmed A. Elngar, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global Scientific Publishing,
$c
2025.
300
$a
1 online resource (xxi, 428 p.) :
$b
ill.
490
1
$a
Advances in information security, privacy, and ethics (AISPE) book series
504
$a
Includes bibliographical references and index.
505
0
$a
Preface -- Chapter 1. Sentiment-Based Summarization of Legal Documents Using Natural Language Processing (NLP) Techniques -- Chapter 2. Exploring Social Engineering Attacks Involving Insights From Case Studies -- Chapter 3. Social Engineering in the Digital Age: A Critical Examination of Attack Techniques, Consequences, and Preventative Measures -- Chapter 4. Cybersecurity in the Age of Social Engineering: Implementing Effective Defense Strategies -- Chapter 5. Exploration of Social Engineering in the Digital Era of Stealth -- Chapter 6. Empowering Cyber Resilience: Effective Strategies for Combating Social Engineering Threats -- Chapter 7. Securing the Weakest Link: Compressive Approaches to Social Engineering Attack Prevention -- Chapter 8. Protecting Against Social Engineering Using Wireshark: Effective Strategies With Real-World Examples -- Chapter 9. Emerging Trends and Future Directions in Social Engineering Defense -- Chapter 10. Exploring the Future Landscape: Emerging Trends in Social Engineering Defense -- Chapter 11. A Comprehensive Guide to Blockchain Technology and Its Role in Enhancing Cyber Security and Combating Social Engineering -- Chapter 12. Social Engineering in Social Media and Online Interactions -- Chapter 13. The Use of Deep Fakes in Social Engineering Attacks: A Case Study on Social Media Engagements -- Chapter 14. The Rising Threat of Deepfake Technology and Frightening Advancementsof Social Engineering -- Chapter 15. Phishing Detection System Using Machine Learning -- Chapter 16. Assortment of Social Engineering Attacks in the New Digital Era -- Compilation of References -- About the Contributors -- Index.
520
3
$a
Effective Strategies for Combatting Social Engineering in Cybersecurity offers a thorough exploration of these challenges, providing a well-rounded approach to understanding and countering social engineering threats. It delves into the theoretical aspects of social engineering, including the psychological principles that drive these attacks, while also offering practical solutions through real-world case studies and applications. By bridging the gap between theory andpractice, the book equips academics, practitioners, and policymakers with actionable strategies to enhance their defenses.
538
$a
Mode of access: World Wide Web.
650
0
$a
Social engineering.
$3
1024723
650
0
$a
Computer security
$x
Social aspects.
$3
1498873
650
0
$a
Business enterprises
$x
Security measures.
$3
566349
650
0
$a
Computer crimes.
$3
564161
653
$a
Attack Techniques.
653
$a
Blockchain Technology.
653
$a
Consequences and Prevention Measures.
653
$a
Cyber Resilience Strategies.
653
$a
Cyber Security.
653
$a
Deep Fakes.
653
$a
Digital Era of Stealth.
653
$a
Effective Defense Strategies.
653
$a
Machine Learning.
653
$a
Online Interactions.
653
$a
Organizational Resilience.
653
$a
Phishing Detection.
653
$a
Social Engineering Attacks.
653
$a
Wireshark Effective Strategies.
655
4
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Elngar, Ahmed A.
$e
editor.
$3
1391517
700
1
$a
Srivastava, Saurabh.
$3
1498787
700
1
$a
Kumar, Rajeev.
$3
1102208
710
2
$a
IGI Global.
$3
805187
776
0 8
$i
Print version:
$z
9798369366653
830
0
$a
Advances in information security, privacy, and ethics (AISPE) book series.
$3
1427689
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-6665-3
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login