Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Effective strategies for combatting ...
~
Elngar, Ahmed A.
Linked to FindBook
Google Book
Amazon
博客來
Effective strategies for combatting social engineering in cybersecurity
Record Type:
Electronic resources : Monograph/item
Title/Author:
Effective strategies for combatting social engineering in cybersecurity/ Rajeev Kumar, Saurabh Srivastava, Ahmed A. Elngar, editors.
other author:
Elngar, Ahmed A.
Published:
Hershey, Pennsylvania :IGI Global Scientific Publishing, : 2025.,
Description:
1 online resource (xxi, 428 p.) :ill.
[NT 15003449]:
Preface -- Chapter 1. Sentiment-Based Summarization of Legal Documents Using Natural Language Processing (NLP) Techniques -- Chapter 2. Exploring Social Engineering Attacks Involving Insights From Case Studies -- Chapter 3. Social Engineering in the Digital Age: A Critical Examination of Attack Techniques, Consequences, and Preventative Measures -- Chapter 4. Cybersecurity in the Age of Social Engineering: Implementing Effective Defense Strategies -- Chapter 5. Exploration of Social Engineering in the Digital Era of Stealth -- Chapter 6. Empowering Cyber Resilience: Effective Strategies for Combating Social Engineering Threats -- Chapter 7. Securing the Weakest Link: Compressive Approaches to Social Engineering Attack Prevention -- Chapter 8. Protecting Against Social Engineering Using Wireshark: Effective Strategies With Real-World Examples -- Chapter 9. Emerging Trends and Future Directions in Social Engineering Defense -- Chapter 10. Exploring the Future Landscape: Emerging Trends in Social Engineering Defense -- Chapter 11. A Comprehensive Guide to Blockchain Technology and Its Role in Enhancing Cyber Security and Combating Social Engineering -- Chapter 12. Social Engineering in Social Media and Online Interactions -- Chapter 13. The Use of Deep Fakes in Social Engineering Attacks: A Case Study on Social Media Engagements -- Chapter 14. The Rising Threat of Deepfake Technology and Frightening Advancementsof Social Engineering -- Chapter 15. Phishing Detection System Using Machine Learning -- Chapter 16. Assortment of Social Engineering Attacks in the New Digital Era -- Compilation of References -- About the Contributors -- Index.
Subject:
Social engineering. -
Online resource:
https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-6665-3
ISBN:
9798369366677
Effective strategies for combatting social engineering in cybersecurity
Effective strategies for combatting social engineering in cybersecurity
[electronic resource] /Rajeev Kumar, Saurabh Srivastava, Ahmed A. Elngar, editors. - Hershey, Pennsylvania :IGI Global Scientific Publishing,2025. - 1 online resource (xxi, 428 p.) :ill. - Advances in information security, privacy, and ethics (AISPE) book series. - Advances in information security, privacy, and ethics (AISPE) book series..
Includes bibliographical references and index.
Preface -- Chapter 1. Sentiment-Based Summarization of Legal Documents Using Natural Language Processing (NLP) Techniques -- Chapter 2. Exploring Social Engineering Attacks Involving Insights From Case Studies -- Chapter 3. Social Engineering in the Digital Age: A Critical Examination of Attack Techniques, Consequences, and Preventative Measures -- Chapter 4. Cybersecurity in the Age of Social Engineering: Implementing Effective Defense Strategies -- Chapter 5. Exploration of Social Engineering in the Digital Era of Stealth -- Chapter 6. Empowering Cyber Resilience: Effective Strategies for Combating Social Engineering Threats -- Chapter 7. Securing the Weakest Link: Compressive Approaches to Social Engineering Attack Prevention -- Chapter 8. Protecting Against Social Engineering Using Wireshark: Effective Strategies With Real-World Examples -- Chapter 9. Emerging Trends and Future Directions in Social Engineering Defense -- Chapter 10. Exploring the Future Landscape: Emerging Trends in Social Engineering Defense -- Chapter 11. A Comprehensive Guide to Blockchain Technology and Its Role in Enhancing Cyber Security and Combating Social Engineering -- Chapter 12. Social Engineering in Social Media and Online Interactions -- Chapter 13. The Use of Deep Fakes in Social Engineering Attacks: A Case Study on Social Media Engagements -- Chapter 14. The Rising Threat of Deepfake Technology and Frightening Advancementsof Social Engineering -- Chapter 15. Phishing Detection System Using Machine Learning -- Chapter 16. Assortment of Social Engineering Attacks in the New Digital Era -- Compilation of References -- About the Contributors -- Index.
Effective Strategies for Combatting Social Engineering in Cybersecurity offers a thorough exploration of these challenges, providing a well-rounded approach to understanding and countering social engineering threats. It delves into the theoretical aspects of social engineering, including the psychological principles that drive these attacks, while also offering practical solutions through real-world case studies and applications. By bridging the gap between theory andpractice, the book equips academics, practitioners, and policymakers with actionable strategies to enhance their defenses.
Mode of access: World Wide Web.
ISBN: 9798369366677Subjects--Topical Terms:
631145
Social engineering.
Subjects--Index Terms:
Attack Techniques.Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: HM668 / .E34 2025eb
Dewey Class. No.: 301
Effective strategies for combatting social engineering in cybersecurity
LDR
:03916nmm a2200457 a 4500
001
2415656
006
m o d
007
cr nn |||muauu
008
260207s2025 paua ob 001 0 eng d
020
$a
9798369366677
$q
(ebook)
020
$z
9798369366653
$q
(hardback)
035
$a
(CaBNVSL)slc00007279
035
$a
(OCoLC)1482400472
035
$a
00345243
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
041
0
$a
eng
050
4
$a
HM668
$b
.E34 2025eb
082
0 4
$a
301
$2
23
245
0 0
$a
Effective strategies for combatting social engineering in cybersecurity
$h
[electronic resource] /
$c
Rajeev Kumar, Saurabh Srivastava, Ahmed A. Elngar, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global Scientific Publishing,
$c
2025.
300
$a
1 online resource (xxi, 428 p.) :
$b
ill.
490
1
$a
Advances in information security, privacy, and ethics (AISPE) book series
504
$a
Includes bibliographical references and index.
505
0
$a
Preface -- Chapter 1. Sentiment-Based Summarization of Legal Documents Using Natural Language Processing (NLP) Techniques -- Chapter 2. Exploring Social Engineering Attacks Involving Insights From Case Studies -- Chapter 3. Social Engineering in the Digital Age: A Critical Examination of Attack Techniques, Consequences, and Preventative Measures -- Chapter 4. Cybersecurity in the Age of Social Engineering: Implementing Effective Defense Strategies -- Chapter 5. Exploration of Social Engineering in the Digital Era of Stealth -- Chapter 6. Empowering Cyber Resilience: Effective Strategies for Combating Social Engineering Threats -- Chapter 7. Securing the Weakest Link: Compressive Approaches to Social Engineering Attack Prevention -- Chapter 8. Protecting Against Social Engineering Using Wireshark: Effective Strategies With Real-World Examples -- Chapter 9. Emerging Trends and Future Directions in Social Engineering Defense -- Chapter 10. Exploring the Future Landscape: Emerging Trends in Social Engineering Defense -- Chapter 11. A Comprehensive Guide to Blockchain Technology and Its Role in Enhancing Cyber Security and Combating Social Engineering -- Chapter 12. Social Engineering in Social Media and Online Interactions -- Chapter 13. The Use of Deep Fakes in Social Engineering Attacks: A Case Study on Social Media Engagements -- Chapter 14. The Rising Threat of Deepfake Technology and Frightening Advancementsof Social Engineering -- Chapter 15. Phishing Detection System Using Machine Learning -- Chapter 16. Assortment of Social Engineering Attacks in the New Digital Era -- Compilation of References -- About the Contributors -- Index.
520
3
$a
Effective Strategies for Combatting Social Engineering in Cybersecurity offers a thorough exploration of these challenges, providing a well-rounded approach to understanding and countering social engineering threats. It delves into the theoretical aspects of social engineering, including the psychological principles that drive these attacks, while also offering practical solutions through real-world case studies and applications. By bridging the gap between theory andpractice, the book equips academics, practitioners, and policymakers with actionable strategies to enhance their defenses.
538
$a
Mode of access: World Wide Web.
650
0
$a
Social engineering.
$3
631145
650
0
$a
Computer security
$x
Social aspects.
$3
3793614
650
0
$a
Business enterprises
$x
Security measures.
$3
913112
650
0
$a
Computer crimes.
$3
583792
653
$a
Attack Techniques.
653
$a
Blockchain Technology.
653
$a
Consequences and Prevention Measures.
653
$a
Cyber Resilience Strategies.
653
$a
Cyber Security.
653
$a
Deep Fakes.
653
$a
Digital Era of Stealth.
653
$a
Effective Defense Strategies.
653
$a
Machine Learning.
653
$a
Online Interactions.
653
$a
Organizational Resilience.
653
$a
Phishing Detection.
653
$a
Social Engineering Attacks.
653
$a
Wireshark Effective Strategies.
655
4
$a
Electronic books.
$2
lcsh
$3
542853
700
1
$a
Elngar, Ahmed A.
$3
3720698
700
1
$a
Srivastava, Saurabh.
$3
3793523
700
1
$a
Kumar, Rajeev.
$3
2179467
710
2
$a
IGI Global.
$3
1361470
776
0 8
$i
Print version:
$z
9798369366653
830
0
$a
Advances in information security, privacy, and ethics (AISPE) book series.
$3
3675641
856
4 0
$u
https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-6665-3
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9521101
電子資源
11.線上閱覽_V
電子書
EB HM668 .E34 2025eb
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login