Vtome.ru - электронная библиотека

Deception in the Digital Age: Exploiting and Defending Human Targets through Computer-Mediated Communications

  • Добавил: buratino
  • Дата: 31-07-2019, 09:05
  • Комментариев: 0
Название: Deception in the Digital Age: Exploiting and Defending Human Targets through Computer-Mediated Communications
Автор: Cameron H. Malin, Terry Gudaitis, Thomas Holt, Max Kilger
Издательство: Academic Press
Год: 2017
Формат: epub
Страниц: 284
Размер: 90.5 Mb
Язык: English

Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception―and how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory and narrative bases of misdirection, used to shape the targeted audience’s perceptions and beliefs.
The text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks―and conversely postmortem insight about attackers―presenting a unique resource that empowers readers to observe, understand and protect against cyber deception tactics.
Written by information security experts with real-world investigative experience, the text is the most instructional book available on the subject, providing practical guidance to readers with rich literature references, diagrams and examples that enhance the learning process.
Deeply examines the psychology of deception through the lens of misdirection and other techniques used by master magicians
Explores cognitive vulnerabilities that cyber attackers use to exploit human targets
Dissects the underpinnings and elements of deception narratives
Examines group dynamics and deception factors in cyber attacker underground markets
Provides deep coverage on how cyber attackers leverage psychological influence techniques in the trajectory of deception strategies
Explores the deception strategies used in today’s threat landscape―phishing, watering hole, scareware and ransomware attacks
Gives unprecedented insight into deceptive Internet video communications
Delves into the history and deception pathways of nation-state and cyber terrorism attackers
Provides unique insight into honeypot technologies and strategies
Explores the future of cyber deception














ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!


ПРАВООБЛАДАТЕЛЯМ


СООБЩИТЬ ОБ ОШИБКЕ ИЛИ НЕ РАБОЧЕЙ ССЫЛКЕ



Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.