Social Engineering in Cybersecurity
Threats and Defenses
Herausgeber: V, Ambika; V, Janhavi; H L, Gururaj
Social Engineering in Cybersecurity
Threats and Defenses
Herausgeber: V, Ambika; V, Janhavi; H L, Gururaj
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
In this book each attack vector is dissected with detailed explanations, real-world examples, countermeasures.
Andere Kunden interessierten sich auch für
- The Future of Human-Computer Integration87,99 €
- Dan ShoemakerA Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)131,99 €
- Ravi DasHow to Start Your Own Cybersecurity Consulting Business165,99 €
- ABC - AI, Blockchain, and Cybersecurity for Healthcare179,99 €
- Mark BergenLike, Comment, Subscribe22,99 €
- Anne KohnkeThe Complete Guide to Cybersecurity Risks and Controls160,99 €
- Ethan MollickCo-Intelligence22,99 €
-
-
-
In this book each attack vector is dissected with detailed explanations, real-world examples, countermeasures.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 224
- Erscheinungstermin: 28. Juni 2024
- Englisch
- Abmessung: 234mm x 156mm
- Gewicht: 600g
- ISBN-13: 9781032524405
- ISBN-10: 1032524405
- Artikelnr.: 70149093
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 224
- Erscheinungstermin: 28. Juni 2024
- Englisch
- Abmessung: 234mm x 156mm
- Gewicht: 600g
- ISBN-13: 9781032524405
- ISBN-10: 1032524405
- Artikelnr.: 70149093
DR. GURURAJ H L (Senior Member, IEEE) received the Ph.D. degree in computer science and engineering from Visvesvaraya Technological University India in 2019. He has published more than 200 research articles in peer-reviewed and reputed international journals. He has authored 15 Edited books in Springer, IET, IGI Global and Taylor & Francis. He has presented more than 100 papers at various international conferences. He is a Senior Member of ACM. He received a Young Scientist International Travel Support ITS-SERB, Department of Science and Technology, Government of India, in December 2016. He was a recipient of best paper awards at various national and international conferences. He was appointed as an ACM Distinguish Speaker (2018-2021) by the ACM U.S. Council. He has honoured as Keynote Speaker, Session chair, TPC member, Advisory committee member at International Seminars, Workshops and Conferences across Globe. Prof. Gururaj's research interests are Applications in Machine and federated Learning, data mining, Blockchain and cyber security. Dr. Janhavi V received the Ph.D. degree in computer science and engineering from Visvesvaraya Technological University India. She is currently working as an Associate Professor in the department of CS&E at Vidyavardhaka College of Engineering, Mysuru. She has published many research articles in peer-reviewed and reputed international journals. Ambika V has completed her M. Tech in Computer Network Engineering from Visvesvaraya Technological University. She is currently working as an Assistant Professor in the Department of Bachelor of Computer Applications at Mysore Institute of Commerce and Arts, Mysuru, Karnataka. She has published various research papers in various reputed international journals and conferences. Her areas of interest include Computer Networks, Cybersecurity, Information security and Cryptography.
Introduction to Social Engineering: The Human Element of Hacking; Social
Engineering: The Information Gathering Phase in Social Engineering; Cyber
Security Risks, Vulnerabilities and Counter Measures to Prevent Social
Engineering Attacks; A Case Study on Packet Sniffers: Tools, Techniques,
and Tactics; Unraveling the Impact of Social Engineering on Organizations;
Impacts of Social Engineering in E-banking; The Art of Deception: Unmasking
the Tools and Psychological Principles Behind Social Engineering; Social
Engineering in Cyber Security-threats and Defenses
A Machine Learning Algorithm to Tackle Chat Messages; A Survey on Security
Model for Internet of Things Environment; A Study on Image Detection and
Extraction to Estimate Distracted Driver using CNN and IOT; Social
Engineering: Cyber Attacks, Countermeasures and Conclusions
Engineering: The Information Gathering Phase in Social Engineering; Cyber
Security Risks, Vulnerabilities and Counter Measures to Prevent Social
Engineering Attacks; A Case Study on Packet Sniffers: Tools, Techniques,
and Tactics; Unraveling the Impact of Social Engineering on Organizations;
Impacts of Social Engineering in E-banking; The Art of Deception: Unmasking
the Tools and Psychological Principles Behind Social Engineering; Social
Engineering in Cyber Security-threats and Defenses
A Machine Learning Algorithm to Tackle Chat Messages; A Survey on Security
Model for Internet of Things Environment; A Study on Image Detection and
Extraction to Estimate Distracted Driver using CNN and IOT; Social
Engineering: Cyber Attacks, Countermeasures and Conclusions
Introduction to Social Engineering: The Human Element of Hacking; Social
Engineering: The Information Gathering Phase in Social Engineering; Cyber
Security Risks, Vulnerabilities and Counter Measures to Prevent Social
Engineering Attacks; A Case Study on Packet Sniffers: Tools, Techniques,
and Tactics; Unraveling the Impact of Social Engineering on Organizations;
Impacts of Social Engineering in E-banking; The Art of Deception: Unmasking
the Tools and Psychological Principles Behind Social Engineering; Social
Engineering in Cyber Security-threats and Defenses
A Machine Learning Algorithm to Tackle Chat Messages; A Survey on Security
Model for Internet of Things Environment; A Study on Image Detection and
Extraction to Estimate Distracted Driver using CNN and IOT; Social
Engineering: Cyber Attacks, Countermeasures and Conclusions
Engineering: The Information Gathering Phase in Social Engineering; Cyber
Security Risks, Vulnerabilities and Counter Measures to Prevent Social
Engineering Attacks; A Case Study on Packet Sniffers: Tools, Techniques,
and Tactics; Unraveling the Impact of Social Engineering on Organizations;
Impacts of Social Engineering in E-banking; The Art of Deception: Unmasking
the Tools and Psychological Principles Behind Social Engineering; Social
Engineering in Cyber Security-threats and Defenses
A Machine Learning Algorithm to Tackle Chat Messages; A Survey on Security
Model for Internet of Things Environment; A Study on Image Detection and
Extraction to Estimate Distracted Driver using CNN and IOT; Social
Engineering: Cyber Attacks, Countermeasures and Conclusions