Phishing: Cutting the Identity Theft Line
5/5
()
About this ebook
If that weren't enough, the crooks have expanded theiroperations to include malicious code that steals identityinformation without the computer user's knowledge. Thousands ofcomputers are compromised each day, and phishing code isincreasingly becoming part of the standard exploits.
Written by a phishing security expert at a top financialinstitution, this unique book helps IT professionals respond tophishing incidents. After describing in detail what goes intophishing expeditions, the author provides step-by-step directionsfor discouraging attacks and responding to those that have alreadyhappened.
In Phishing, Rachael Lininger:
- Offers case studies that reveal the technical ins and outs ofimpressive phishing attacks.
- Presents a step-by-step model for phishing prevention.
- Explains how intrusion detection systems can help preventphishers from attaining their goal-identity theft.
- Delivers in-depth incident response techniques that can quicklyshutdown phishing sites.
Related to Phishing
Related ebooks
Planning for Survivable Networks Rating: 0 out of 5 stars0 ratingsManaging Open Source Projects: A Wiley Tech Brief Rating: 4 out of 5 stars4/5Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft Rating: 0 out of 5 stars0 ratingsThe Good Corporate Citizen: A Practical Guide Rating: 0 out of 5 stars0 ratingsSimple Computer Security: Disinfect Your PC Rating: 0 out of 5 stars0 ratingsThe ForeclosureS.com Guide to Advanced Investing Techniques You Won't Learn Anywhere Else Rating: 0 out of 5 stars0 ratingsOperational Risk with Excel and VBA: Applied Statistical Methods for Risk Management, + Website Rating: 3 out of 5 stars3/5World Without Secrets: Business, Crime, and Privacy in the Age of Ubiquitous Computing Rating: 0 out of 5 stars0 ratingsRetail Security and Loss Prevention Rating: 5 out of 5 stars5/55 Magic Paths to Making a Fortune in Real Estate Rating: 0 out of 5 stars0 ratingsTrojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code Rating: 4 out of 5 stars4/5The Foreclosures.com Guide to Making Huge Profits Investing in Pre-Foreclosures Without Selling Your Soul Rating: 0 out of 5 stars0 ratingsExtraordinary Entrepreneurship: The Professional's Guide to Starting an Exceptional Enterprise Rating: 3 out of 5 stars3/5Enterprise Java with UML Rating: 3 out of 5 stars3/5Organizational Consulting: How to Be an Effective Internal Change Agent Rating: 0 out of 5 stars0 ratingsUnMarketing: Everything Has Changed and Nothing is Different Rating: 0 out of 5 stars0 ratingsExposing Fraud: Skills, Process and Practicalities Rating: 4 out of 5 stars4/5Critical Corporate Communications: A Best Practice Blueprint Rating: 5 out of 5 stars5/5Fraud Exposed: What You Don't Know Could Cost Your Company Millions Rating: 0 out of 5 stars0 ratingsBuilding B2B Applications with XML: A Resource Guide Rating: 5 out of 5 stars5/5Crypto Decrypted: Debunking Myths, Understanding Breakthroughs, and Building Foundations for Digital Asset Investing Rating: 0 out of 5 stars0 ratingsMake Money with Fixer-Uppers and Renovations Rating: 4 out of 5 stars4/5Fraud Smart Rating: 0 out of 5 stars0 ratingsFirewalls For Dummies Rating: 0 out of 5 stars0 ratingsThe Investor's Dilemma: How Mutual Funds Are Betraying Your Trust And What To Do About It Rating: 0 out of 5 stars0 ratingsMake Money with Small Income Properties Rating: 4 out of 5 stars4/5The Networking Survival Guide: Get the Success You Want By Tapping Into the People You Know Rating: 4 out of 5 stars4/5The ebay Phenomenon: Business Secrets Behind the World's Hottest Internet Company Rating: 0 out of 5 stars0 ratings
Security For You
Hacking For Dummies Rating: 4 out of 5 stars4/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsPractical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Destination CISSP Rating: 3 out of 5 stars3/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsHow to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Real-World Cryptography Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHandbook of Digital Forensics and Investigation Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratings
Reviews for Phishing
1 rating1 review
- Rating: 5 out of 5 stars5/5goog