Marton Gergely, Ian Grey, Heba Saleous
Surviving the Wild Wild Web (eBook, ePUB)
A User's Playbook to Navigating the Internet's Trickiest Terrains
31,95 €
31,95 €
inkl. MwSt.
Sofort per Download lieferbar
16 °P sammeln
31,95 €
Als Download kaufen
31,95 €
inkl. MwSt.
Sofort per Download lieferbar
16 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
31,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
16 °P sammeln
Marton Gergely, Ian Grey, Heba Saleous
Surviving the Wild Wild Web (eBook, ePUB)
A User's Playbook to Navigating the Internet's Trickiest Terrains
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The information security arena is often vague and confusing for internet users and fallling into cyber traps can take ethical, financial, physical and mental tolls on individuals. With increasing cases of fake news, identity theft, piracy, spying and scams surfacing, this book explains the risks of the internet and how they can be mitigated.
- Geräte: eReader
- mit Kopierschutz
- eBook Hilfe
Andere Kunden interessierten sich auch für
- Marton GergelySurviving the Wild Wild Web (eBook, PDF)31,95 €
- Internet of Things, Threats, Landscape, and Countermeasures (eBook, ePUB)50,95 €
- Amanda WiddowsonHumans and Cyber Security (eBook, ePUB)20,95 €
- Abbas MoallemUnderstanding Cybersecurity Technologies (eBook, ePUB)47,95 €
- Digital Futures in Human-Computer Interaction (eBook, ePUB)51,95 €
- Andrzej GrabowskiVirtual Reality and Virtual Environments (eBook, ePUB)47,95 €
- Cyber-Security Threats, Actors, and Dynamic Mitigation (eBook, ePUB)51,95 €
-
-
-
The information security arena is often vague and confusing for internet users and fallling into cyber traps can take ethical, financial, physical and mental tolls on individuals. With increasing cases of fake news, identity theft, piracy, spying and scams surfacing, this book explains the risks of the internet and how they can be mitigated.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis eBooks
- Erscheinungstermin: 26. Dezember 2024
- Englisch
- ISBN-13: 9781040263815
- Artikelnr.: 72259139
- Verlag: Taylor & Francis eBooks
- Erscheinungstermin: 26. Dezember 2024
- Englisch
- ISBN-13: 9781040263815
- Artikelnr.: 72259139
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Marton Gergely teaches in the Department of Information Systems and Security at the United Arab Emirates University. He was born in New Delhi, India, and grew up in Budapest, Hungary. He holds a PhD in Business Administration, with an emphasis in Information Technology, from the University of Texas at San Antonio, USA. His current research interests include digital piracy, social and cognitive psychology in technology use, cyber law and ethics, social desirability bias, as well as emerging technologies.
Dr. Ian Grey was born and raised in the wilds of Co. Waterford, Ireland. He holds a BA and a PhD. in Psychology from the National University of Ireland (Cork) and a DClin. Psych from Trinity College Dublin. He holds additional postgraduate qualifications in Applied Behavior Analysis and in Forensic Psychology. He is currently Associate Professor of Clinical Psychology in the Department of Cognitive Science, United Arab Emirates University where he teaches courses on clinical psychology practice. His research interests include cognitive vulnerabilities, neuro-developmental disorders and determinants of mental health.
Heba Saleous is a Palestinian-American currently working towards earning her PhD in Information Security at the United Arab Emirates University under the supervision of Dr. Marton Gergely. She holds an MSc in Information Security from the same institution. Her current research interests include digital forensics, video game forensics and security, cybercrime and terrorism, cybercriminal behavior, and malware.
Dr. Ian Grey was born and raised in the wilds of Co. Waterford, Ireland. He holds a BA and a PhD. in Psychology from the National University of Ireland (Cork) and a DClin. Psych from Trinity College Dublin. He holds additional postgraduate qualifications in Applied Behavior Analysis and in Forensic Psychology. He is currently Associate Professor of Clinical Psychology in the Department of Cognitive Science, United Arab Emirates University where he teaches courses on clinical psychology practice. His research interests include cognitive vulnerabilities, neuro-developmental disorders and determinants of mental health.
Heba Saleous is a Palestinian-American currently working towards earning her PhD in Information Security at the United Arab Emirates University under the supervision of Dr. Marton Gergely. She holds an MSc in Information Security from the same institution. Her current research interests include digital forensics, video game forensics and security, cybercrime and terrorism, cybercriminal behavior, and malware.
Contents
About the authors
Introduction
Chapter 1: Pirates of the Ethernet - Adventures in Illegal Downloading
Chapter 2: If You Teach a Man to Phish... - The Mechanics of Internet Scams
Chapter 3: Me, Myself, and a Stranger - Chronicles of an Identity Thief
Chapter 4: Lies, Likes, and LOLs - Social Media's Fake News Fiasco
Chapter 5: Hacking Health - The Internet's Influence on Medical Information
Chapter 6: I Spy with My Little Eye - The Internet and Digital Espionage
Chapter 7: Bytes and Blues - How the Internet Plays with Adult Minds
Chapter 8: Pixelated Perils - The Double-Edged Sword of Online Gaming
Chapter 9: From Swings to Smartphones - The Impact of Social Media on Kids
Chapter 10: The Ghost in the Machine - AI's Unseen Influence
Epilogue
Acknowledgments
Index
About the authors
Introduction
Chapter 1: Pirates of the Ethernet - Adventures in Illegal Downloading
Chapter 2: If You Teach a Man to Phish... - The Mechanics of Internet Scams
Chapter 3: Me, Myself, and a Stranger - Chronicles of an Identity Thief
Chapter 4: Lies, Likes, and LOLs - Social Media's Fake News Fiasco
Chapter 5: Hacking Health - The Internet's Influence on Medical Information
Chapter 6: I Spy with My Little Eye - The Internet and Digital Espionage
Chapter 7: Bytes and Blues - How the Internet Plays with Adult Minds
Chapter 8: Pixelated Perils - The Double-Edged Sword of Online Gaming
Chapter 9: From Swings to Smartphones - The Impact of Social Media on Kids
Chapter 10: The Ghost in the Machine - AI's Unseen Influence
Epilogue
Acknowledgments
Index
Contents
About the authors
Introduction
Chapter 1: Pirates of the Ethernet - Adventures in Illegal Downloading
Chapter 2: If You Teach a Man to Phish... - The Mechanics of Internet Scams
Chapter 3: Me, Myself, and a Stranger - Chronicles of an Identity Thief
Chapter 4: Lies, Likes, and LOLs - Social Media's Fake News Fiasco
Chapter 5: Hacking Health - The Internet's Influence on Medical Information
Chapter 6: I Spy with My Little Eye - The Internet and Digital Espionage
Chapter 7: Bytes and Blues - How the Internet Plays with Adult Minds
Chapter 8: Pixelated Perils - The Double-Edged Sword of Online Gaming
Chapter 9: From Swings to Smartphones - The Impact of Social Media on Kids
Chapter 10: The Ghost in the Machine - AI's Unseen Influence
Epilogue
Acknowledgments
Index
About the authors
Introduction
Chapter 1: Pirates of the Ethernet - Adventures in Illegal Downloading
Chapter 2: If You Teach a Man to Phish... - The Mechanics of Internet Scams
Chapter 3: Me, Myself, and a Stranger - Chronicles of an Identity Thief
Chapter 4: Lies, Likes, and LOLs - Social Media's Fake News Fiasco
Chapter 5: Hacking Health - The Internet's Influence on Medical Information
Chapter 6: I Spy with My Little Eye - The Internet and Digital Espionage
Chapter 7: Bytes and Blues - How the Internet Plays with Adult Minds
Chapter 8: Pixelated Perils - The Double-Edged Sword of Online Gaming
Chapter 9: From Swings to Smartphones - The Impact of Social Media on Kids
Chapter 10: The Ghost in the Machine - AI's Unseen Influence
Epilogue
Acknowledgments
Index