Social Engineering in Cybersecurity
Threats and Defenses
Herausgeber: H L, Gururaj; V, Ambika; V, Janhavi
Social Engineering in Cybersecurity
Threats and Defenses
Herausgeber: H L, Gururaj; V, Ambika; V, Janhavi
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
In this book each attack vector is dissected with detailed explanations, real-world examples, countermeasures.
Andere Kunden interessierten sich auch für
- Tara KissoonOptimal Spending on Cybersecurity Measures152,99 €
- Blockchain Technology in the Automotive Industry153,99 €
- AI, Blockchain, and Metaverse in Hospitality and Tourism Industry 4.0206,99 €
- Abbas KudratiZero Trust Journey Across the Digital Estate156,99 €
- Denise CicchellaConstruction Audit152,99 €
- Douglas LandollThe Security Risk Assessment Handbook189,99 €
- Bill Hefley / Wendy Murphy (eds.)Service Science, Management and Engineering74,99 €
-
-
-
In this book each attack vector is dissected with detailed explanations, real-world examples, countermeasures.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd (Sales)
- Seitenzahl: 224
- Erscheinungstermin: 28. Juni 2024
- Englisch
- Abmessung: 234mm x 156mm x 14mm
- Gewicht: 517g
- ISBN-13: 9781032524405
- ISBN-10: 1032524405
- Artikelnr.: 70149093
- Verlag: Taylor & Francis Ltd (Sales)
- Seitenzahl: 224
- Erscheinungstermin: 28. Juni 2024
- Englisch
- Abmessung: 234mm x 156mm x 14mm
- Gewicht: 517g
- ISBN-13: 9781032524405
- ISBN-10: 1032524405
- Artikelnr.: 70149093
DR. GURURAJ H L (Senior Member, IEEE) received the Ph.D. degree in computer science and engineering from Visvesvaraya Technological University India in 2019. He has published more than 200 research articles in peer-reviewed and reputed international journals. He has authored 15 Edited books in Springer, IET, IGI Global and Taylor & Francis. He has presented more than 100 papers at various international conferences. He is a Senior Member of ACM. He received a Young Scientist International Travel Support ITS-SERB, Department of Science and Technology, Government of India, in December 2016. He was a recipient of best paper awards at various national and international conferences. He was appointed as an ACM Distinguish Speaker (2018-2021) by the ACM U.S. Council. He has honoured as Keynote Speaker, Session chair, TPC member, Advisory committee member at International Seminars, Workshops and Conferences across Globe. Prof. Gururaj's research interests are Applications in Machine and federated Learning, data mining, Blockchain and cyber security. Dr. Janhavi V received the Ph.D. degree in computer science and engineering from Visvesvaraya Technological University India. She is currently working as an Associate Professor in the department of CS&E at Vidyavardhaka College of Engineering, Mysuru. She has published many research articles in peer-reviewed and reputed international journals. Ambika V has completed her M. Tech in Computer Network Engineering from Visvesvaraya Technological University. She is currently working as an Assistant Professor in the Department of Bachelor of Computer Applications at Mysore Institute of Commerce and Arts, Mysuru, Karnataka. She has published various research papers in various reputed international journals and conferences. Her areas of interest include Computer Networks, Cybersecurity, Information security and Cryptography.
Introduction to Social Engineering: The Human Element of Hacking; Social
Engineering: The Information Gathering Phase in Social Engineering; Cyber
Security Risks, Vulnerabilities and Counter Measures to Prevent Social
Engineering Attacks; A Case Study on Packet Sniffers: Tools, Techniques,
and Tactics; Unraveling the Impact of Social Engineering on Organizations;
Impacts of Social Engineering in E-banking; The Art of Deception: Unmasking
the Tools and Psychological Principles Behind Social Engineering; Social
Engineering in Cyber Security-threats and Defenses
A Machine Learning Algorithm to Tackle Chat Messages; A Survey on Security
Model for Internet of Things Environment; A Study on Image Detection and
Extraction to Estimate Distracted Driver using CNN and IOT; Social
Engineering: Cyber Attacks, Countermeasures and Conclusions
Engineering: The Information Gathering Phase in Social Engineering; Cyber
Security Risks, Vulnerabilities and Counter Measures to Prevent Social
Engineering Attacks; A Case Study on Packet Sniffers: Tools, Techniques,
and Tactics; Unraveling the Impact of Social Engineering on Organizations;
Impacts of Social Engineering in E-banking; The Art of Deception: Unmasking
the Tools and Psychological Principles Behind Social Engineering; Social
Engineering in Cyber Security-threats and Defenses
A Machine Learning Algorithm to Tackle Chat Messages; A Survey on Security
Model for Internet of Things Environment; A Study on Image Detection and
Extraction to Estimate Distracted Driver using CNN and IOT; Social
Engineering: Cyber Attacks, Countermeasures and Conclusions
Introduction to Social Engineering: The Human Element of Hacking; Social
Engineering: The Information Gathering Phase in Social Engineering; Cyber
Security Risks, Vulnerabilities and Counter Measures to Prevent Social
Engineering Attacks; A Case Study on Packet Sniffers: Tools, Techniques,
and Tactics; Unraveling the Impact of Social Engineering on Organizations;
Impacts of Social Engineering in E-banking; The Art of Deception: Unmasking
the Tools and Psychological Principles Behind Social Engineering; Social
Engineering in Cyber Security-threats and Defenses
A Machine Learning Algorithm to Tackle Chat Messages; A Survey on Security
Model for Internet of Things Environment; A Study on Image Detection and
Extraction to Estimate Distracted Driver using CNN and IOT; Social
Engineering: Cyber Attacks, Countermeasures and Conclusions
Engineering: The Information Gathering Phase in Social Engineering; Cyber
Security Risks, Vulnerabilities and Counter Measures to Prevent Social
Engineering Attacks; A Case Study on Packet Sniffers: Tools, Techniques,
and Tactics; Unraveling the Impact of Social Engineering on Organizations;
Impacts of Social Engineering in E-banking; The Art of Deception: Unmasking
the Tools and Psychological Principles Behind Social Engineering; Social
Engineering in Cyber Security-threats and Defenses
A Machine Learning Algorithm to Tackle Chat Messages; A Survey on Security
Model for Internet of Things Environment; A Study on Image Detection and
Extraction to Estimate Distracted Driver using CNN and IOT; Social
Engineering: Cyber Attacks, Countermeasures and Conclusions