LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code is needed.
Book sale: Save up to 25% on print and eBooks. No promo code needed.
Book sale: Save up to 25% on print and eBooks.
1st Edition - June 23, 2017
Authors: Cameron H. Malin, Terry Gudaitis, Thomas Holt, Max Kilger
Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of… Read more
LIMITED OFFER
Immediately download your ebook while waiting for your print delivery. No promo code is needed.
Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception—and how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory and narrative bases of misdirection, used to shape the targeted audience’s perceptions and beliefs.
The text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks—and conversely postmortem insight about attackers—presenting a unique resource that empowers readers to observe, understand and protect against cyber deception tactics.
Written by information security experts with real-world investigative experience, the text is the most instructional book available on the subject, providing practical guidance to readers with rich literature references, diagrams and examples that enhance the learning process.
Information Security professionals of all levels, system administrators, forensic examiners, CIOs, CSOs, IT managers, InfoSec consultants, risk management consultants. criminologists, sociologists, attorneys, law enforcement officers
1. The Psychology of Deception
2. Virtual Myths: Internet Urban Legend, Chain Letters, and Warnings
3. Viral Influence: Deceptive Computing Attacks through Persuasion
4. Social Dynamics of Deception: Cyber Underground Markets and Cultures
5. Phishing, Watering Holes, and Scareware
6. Seeing is not Believing: Deceptive Internet Video Communications
7. e-Jihad: Jihadist Use of Cyber Denial and Deception
8. Asymmetric Warfare and Psyops: Nation State Sponsored Cyber Attacks
9. Sweet Deception: Honeypots
10. Looking Forward
CM
TG
TH
MK