How to catch a phish : a practical guide to detecting phishing emails (Record no. 33849)

000 -LEADER
fixed length control field a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250408b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781484293607
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Item number OLE
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Oles, Nicholas
245 ## - TITLE STATEMENT
Title How to catch a phish : a practical guide to detecting phishing emails
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc Apress,
Date of publication, distribution, etc 2023
Place of publication, distribution, etc California :
300 ## - PHYSICAL DESCRIPTION
Extent xi, 147 p. ;
Other physical details ill. (some col.),
Dimensions 23 cm.
365 ## - TRADE PRICE
Unit of pricing 499.00
Price amount
Price type code 01
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes index.
520 ## - SUMMARY, ETC.
Summary, etc Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization and individual with an email account is susceptible to deceptive emails sent by attackers with nefarious intentions. This activity, known as phishing, involves an attacker attempting to lure individuals into providing sensitive information or performing a predetermined action. Attacks vary in sophistication, but the core skills and process to detect, analyze, and respond to a suspicious message does not change. Attackers have preyed on victims with convincing and not-so-convincing phishing emails to gain initial footholds into networks around the world for over 30 years. This attack method has been rapidly growing in popularity and continues to be the number one method that organizations and individuals struggle to defend against. Regardless of what any vendor or organization will tell you, no infallible tool exists to eliminate this threat completely. This book teaches you how to analyze suspicious messages using free tools and resources. You will understand the basics of email, tactics used by attackers, and a repeatable process to systematically analyze messages and respond to suspicious activity. You Will Learn How to: Safely save email messages as attachments for analysis Identify what information is in an email header Review header information and extract key indicators or patterns used for detection Identify signs of a suspicious or malicious email message Detect the tactics that attackers use in phishing emails Safely examine email links and attachments Use a variety of free and simple tools to analyze.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Email Security Measures
Topical term or geographic name as entry element Phishing Prevention
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Source of acquisition Cost, normal purchase price Full call number Barcode Date last seen Koha item type
          DAU DAU 2025-03-30 KBD 499.00 005.82 OLE 035348 2025-04-08 Books

Powered by Koha