Catalogue

Record Details

Catalogue Search


Back To Results
Showing Item 32 of 904

Fighting phishing : everything you can do to fight social engineering and phishing  Cover Image Book Book

Fighting phishing : everything you can do to fight social engineering and phishing

Grimes, Roger A. (Author). Just, John N. (Added Author).

Summary: Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to individuals. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them, Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin, Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading, Develop technology and security policies that protect your organization against the most common types of social engineering and phishing. Anyone looking to defend themselves or their organization from phishing will appreciate the uncommonly comprehensive approach in Fighting Phishing.

Record details

  • ISBN: 9781394249206 (pbk.)
  • Physical Description: xxii, 425 pages : illustrations ; 23 cm
    print
  • Publisher: Hoboken, New Jersey : John Wiley & Sons, Inc., [2024]

Content descriptions

General Note:
Includes index.
Formatted Contents Note: Part I Introduction to Social Engineering Security -- Chapter 1 Introduction to Social Engineering and Phishing -- Chapter 2 Phishing Terminology and Examples -- Chapter 3 3x3 Cybersecurity Control Pillars -- PART II Policies -- Chapter 4 Acceptable Use and General Cybersecurity Policies -- Chapter 5 Anti-Phishing Policies -- Chapter 6 Creating a Corporate SAT Policy -- Part III Technical Defenses -- Chapter 7 DMARC, SPF, and DKIM -- Chapter 8 Network and Server Defenses -- Chapter 9 Endpoint Defenses -- Chapter 10 Advanced Defenses -- Part IV Creating a Great Security Awareness Program -- Chapter 11 Security Awareness Training Overview -- Chapter 12 How to Do Training Right -- Chapter 13 Recognizing Rogue URLs -- Chapter 14 Fighting Spear Phishing -- Chapter 15 Forensically Examining Emails -- Chapter 16 Miscellaneous Hints and Tricks -- Chapter 17 Improving Your Security Culture.
Subject: Phishing
Phishing -- Prevention
Electronic mail messages -- Security measures
Computer security

Available copies

  • 1 of 1 copy available at University College of the North Libraries.

Holds

  • 0 current holds with 1 total copy.
Show Only Available Copies
Location Call Number / Copy Notes Barcode Shelving Location Holdable? Status Due Date
The Pas Campus Library HV 6773.15 .P45 G756 2024 (Text) 58500001253343 Stacks Volume hold Available -

Back To Results
Showing Item 32 of 904

Additional Resources