The Locator -- [(title = "Criminals ")]

704 records matched your query       


Record 1 | Previous Record | Long Display | Next Record
05473aam a2200337 i 4500
001 744B3C36440211EF98CC15ED37ECA4DB
003 SILO
005 20240717010108
008 230312t20242024enk      b    001 0 eng d
020    $a 1398613703
020    $a 9781398613706
020    $a 139861372X
020    $a 9781398613720
035    $a (OCoLC)1371585054
040    $a YDX $b eng $e rda $c YDX $d OCLCQ $d GO9 $d YDX $d SILO
050  4 $a HV6773 B37 2024
100 1  $a Barker, Jessica $c (Cyber security), $e author.
245 10 $a Hacked : $b the secrets behind cyber attacks / $c Jessica Barker.
264  1 $a London, United Kingdom ; $b Kogan Page Limited, $c 2024.
300    $a xiv, 284 pages ; $c 20 cm
504    $a Includes bibliographical references and index.
505 00 $t Conclusion: staying safe from cyber attacks $t Phishing -- $t Email phishing -- $t Business email compromise -- $t Phishing phnone calls -- $t Caller ID spoofing -- $t Phishing messages -- $t QR code phishing -- $t Hybrid phishing -- $t Protect against phishing -- $t Notes -- $t Account compromise -- $t Passwords -- $t SMS 2FA -- $t Stronger 2FA -- $t 2FA fatigue -- $t Password managers -- $t Advice for securing your accounts -- $t Notes -- $t Vulnerabilities and exploits -- $t Zero-day vulnerabilities -- $t N-day vulnerabilities - $t A vacuum of patches -- $t The vulnerability ecosystem -- $t Vulnerabilities and different devices -- $t Managing vulnerabilities and mitigating exploits -- $t Romance fraud -- $t The psychological strategy of romance scammers -- $t When you are the catfish -- $t Social media and romance scams -- $t The psychology of romance fraud -- $t The impact of romance fraud on victims -- $t Sextortion: image-based sexual abuse -- $t Spotting romance fraud red flags and staying safe -- $t Notes -- $t Cyber fraud -- $t What makes a fraudster? -- $t The strategy and tactics of a fraud - $t Authorized fraud -- $t Unauthorized fraud -- $t How criminals cash out: money mules -- $t The impact of fraud -- $t Fighting fraud: how to stay safe -- $t Notes -- $t Identity fraud -- $t The impact of identity fraud on victims -- $t The scale of identity theft and identity fraud -- $t The tactics of identity fraudsters -- $t Identity fraud and cyber crime - $t Avoiding identity theft -- $t Notes -- $t Social; media scams -- $t Fake people -- $t Fake goods -- $t Fake influencer opportunities -- $t Fake jobs -- $t Fake news -- $r t Surging social media scams -- $t Stay social media savvy -- $t Notes -- $t Malicious insiders -- $t What motivates malicious insiders? -- $t Formula 1 spygate -- $t A wake-up call -- $t The impact of malicious insiders -- $t Malicious insiders and the human side of cyber security -- $t How businesses can protect against malicious insiders -- $t Notes -- $t Malware -- $t Worms -- $t Viruses -- $t The global reach of malware -- $t Trojans -- $t Ransomware -- $t Malware-as-a-service -- $t Spyware -- $t Protecting against malware -- $t Notes -- $t Randomware -- $t Cryptocurrency -- $t An evolving ransomware business model -- $t Big game hunting in randsomware -- $t Law enforcement whack-a-mole -- $t Borders in a borderless crime -- $t Insurance, brokers, and negotiators -- $t To pay or not pay, is that the question? -- $t Ransomware mitigations and managing an incident -- $t Notes -- $t Internet of Tings (IoT) -- $t Default passwords -- $t THe Mirai fallout -- $t Lessons from Mirai -- $t Mirai's legacy -- $t Security the Internet of Things -- $t Cyber security in an increasingly connected world -- $t Notes -- $t Cryptocurrency crime -- $t Pig-butchering scams -- $t Billions of cryptocurrecy -- $t Cyrptocurrency: untraceable money? -- $t Cryptocurrency investigations and the return on investtment -- $t Not all exchanges are equal -- $t Staying safe with cryptocurrency -- $t Notes -- $t Artificial intelligence -- $t The rise of the machines -- $t AI: a force multiplier of fear, uncertainty, and doubt -- $t Gabage in, garbage, out -- $t Large language models -- $t Deepfakes -- $t National and international implications of AI -- $t Organizational implications of AI -- $t Implications of AI for individuals -- $t Plausible deniability -- $t Staying cyber safe in an AI age -- $t Notes -- $t Conclusion: staying safe from cyber attacks
520    $a When it comes to cyber attacks, everyone's a potential victim. But you don't have to be helpless against these threats. Hacked offers the knowledge and strategies you need to protect yourself and your business. In this book, cybersecurity expert Jessica Barker uncovers how hackers are weaponizing cutting-edge tactics and technologies to target individuals and organizations, before showing how you can safeguard yourself against any potential attacks and how to react if you do become a target. Featuring expert commentary from world-leading cybersecurity experts and ethical hackers, this book uncovers the fascinating stories of the most insidious and notorious cyber attacks, including how the Mirai malware almost took down the internet and how a supply chain attack infiltrated the US government and other global institutions. From social engineering and data theft to ransomware and Distributed Denial-of-Service (DDoS) attacks, there are numerous strategies that hackers use to target our finances and data. Uncover their secrets and learn how to safeguard your data with Hacked. -- $c amazon.com
650  0 $a Computer crimes.
650  0 $a Computer crimes $x Prevention.
650  0 $a Cyberterrorism.
650  0 $a Computer security.
941    $a 1
952    $l USUX851 $d 20240717031225.0
956    $a http://locator.silo.lib.ia.us/search.cgi?index_0=id&term_0=744B3C36440211EF98CC15ED37ECA4DB
994    $a C0 $b IWA

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.