Social Engineering in Cybersecurity (eBook, PDF)
Threats and Defenses
Redaktion: H L, Gururaj; V, Ambika; V, Janhavi
52,95 €
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
26 °P sammeln
52,95 €
Als Download kaufen
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
26 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
52,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
26 °P sammeln
Social Engineering in Cybersecurity (eBook, PDF)
Threats and Defenses
Redaktion: H L, Gururaj; V, Ambika; V, Janhavi
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
In this book each attack vector is dissected with detailed explanations, real-world examples, countermeasures.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 6.34MB
Andere Kunden interessierten sich auch für
- Social Engineering in Cybersecurity (eBook, ePUB)52,95 €
- Cyber Security for Next-Generation Computing Technologies (eBook, PDF)52,95 €
- Tara KissoonOptimal Spending on Cybersecurity Measures (eBook, PDF)47,95 €
- Arun SoniThe Cybersecurity Self-Help Guide (eBook, PDF)47,95 €
- Lukasz OlejnikPhilosophy of Cybersecurity (eBook, PDF)47,95 €
- Robert SladeCybersecurity Lessons from CoVID-19 (eBook, PDF)21,95 €
- Cybersecurity Issues in Emerging Technologies (eBook, PDF)47,95 €
-
-
-
In this book each attack vector is dissected with detailed explanations, real-world examples, countermeasures.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 240
- Erscheinungstermin: 28. Juni 2024
- Englisch
- ISBN-13: 9781040018644
- Artikelnr.: 70718114
- Verlag: Taylor & Francis
- Seitenzahl: 240
- Erscheinungstermin: 28. Juni 2024
- Englisch
- ISBN-13: 9781040018644
- Artikelnr.: 70718114
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
DR. GURURAJ H L (Senior Member, IEEE) received the Ph.D. degree in computer science and engineering from Visvesvaraya Technological University India in 2019. He has published more than 200 research articles in peer-reviewed and reputed international journals. He has authored 15 Edited books in Springer, IET, IGI Global and Taylor & Francis. He has presented more than 100 papers at various international conferences. He is a Senior Member of ACM. He received a Young Scientist International Travel Support ITS-SERB, Department of Science and Technology, Government of India, in December 2016. He was a recipient of best paper awards at various national and international conferences. He was appointed as an ACM Distinguish Speaker (2018-2021) by the ACM U.S. Council. He has honoured as Keynote Speaker, Session chair, TPC member, Advisory committee member at International Seminars, Workshops and Conferences across Globe. Prof. Gururaj's research interests are Applications in Machine and federated Learning, data mining, Blockchain and cyber security. Dr. Janhavi V received the Ph.D. degree in computer science and engineering from Visvesvaraya Technological University India. She is currently working as an Associate Professor in the department of CS&E at Vidyavardhaka College of Engineering, Mysuru. She has published many research articles in peer-reviewed and reputed international journals. Ambika V has completed her M. Tech in Computer Network Engineering from Visvesvaraya Technological University. She is currently working as an Assistant Professor in the Department of Bachelor of Computer Applications at Mysore Institute of Commerce and Arts, Mysuru, Karnataka. She has published various research papers in various reputed international journals and conferences. Her areas of interest include Computer Networks, Cybersecurity, Information security and Cryptography.
Introduction to Social Engineering: The Human Element of Hacking; Social
Engineering: The Information Gathering Phase in Social Engineering; Cyber
Security Risks, Vulnerabilities and Counter Measures to Prevent Social
Engineering Attacks; A Case Study on Packet Sniffers: Tools, Techniques,
and Tactics; Unraveling the Impact of Social Engineering on Organizations;
Impacts of Social Engineering in E-banking; The Art of Deception: Unmasking
the Tools and Psychological Principles Behind Social Engineering; Social
Engineering in Cyber Security-threats and Defenses
A Machine Learning Algorithm to Tackle Chat Messages; A Survey on Security
Model for Internet of Things Environment; A Study on Image Detection and
Extraction to Estimate Distracted Driver using CNN and IOT; Social
Engineering: Cyber Attacks, Countermeasures and Conclusions
Engineering: The Information Gathering Phase in Social Engineering; Cyber
Security Risks, Vulnerabilities and Counter Measures to Prevent Social
Engineering Attacks; A Case Study on Packet Sniffers: Tools, Techniques,
and Tactics; Unraveling the Impact of Social Engineering on Organizations;
Impacts of Social Engineering in E-banking; The Art of Deception: Unmasking
the Tools and Psychological Principles Behind Social Engineering; Social
Engineering in Cyber Security-threats and Defenses
A Machine Learning Algorithm to Tackle Chat Messages; A Survey on Security
Model for Internet of Things Environment; A Study on Image Detection and
Extraction to Estimate Distracted Driver using CNN and IOT; Social
Engineering: Cyber Attacks, Countermeasures and Conclusions
Introduction to Social Engineering: The Human Element of Hacking; Social
Engineering: The Information Gathering Phase in Social Engineering; Cyber
Security Risks, Vulnerabilities and Counter Measures to Prevent Social
Engineering Attacks; A Case Study on Packet Sniffers: Tools, Techniques,
and Tactics; Unraveling the Impact of Social Engineering on Organizations;
Impacts of Social Engineering in E-banking; The Art of Deception: Unmasking
the Tools and Psychological Principles Behind Social Engineering; Social
Engineering in Cyber Security-threats and Defenses
A Machine Learning Algorithm to Tackle Chat Messages; A Survey on Security
Model for Internet of Things Environment; A Study on Image Detection and
Extraction to Estimate Distracted Driver using CNN and IOT; Social
Engineering: Cyber Attacks, Countermeasures and Conclusions
Engineering: The Information Gathering Phase in Social Engineering; Cyber
Security Risks, Vulnerabilities and Counter Measures to Prevent Social
Engineering Attacks; A Case Study on Packet Sniffers: Tools, Techniques,
and Tactics; Unraveling the Impact of Social Engineering on Organizations;
Impacts of Social Engineering in E-banking; The Art of Deception: Unmasking
the Tools and Psychological Principles Behind Social Engineering; Social
Engineering in Cyber Security-threats and Defenses
A Machine Learning Algorithm to Tackle Chat Messages; A Survey on Security
Model for Internet of Things Environment; A Study on Image Detection and
Extraction to Estimate Distracted Driver using CNN and IOT; Social
Engineering: Cyber Attacks, Countermeasures and Conclusions