Effective strategies for combatting ...
Elngar, Ahmed A.

Linked to FindBook      Google Book      Amazon      博客來     
  • Effective strategies for combatting social engineering in cybersecurity
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Effective strategies for combatting social engineering in cybersecurity/ Rajeev Kumar, Saurabh Srivastava, Ahmed A. Elngar, editors.
    other author: Elngar, Ahmed A.
    Published: Hershey, Pennsylvania :IGI Global Scientific Publishing, : 2025.,
    Description: 1 online resource (xxi, 428 p.) :ill.
    [NT 15003449]: Preface -- Chapter 1. Sentiment-Based Summarization of Legal Documents Using Natural Language Processing (NLP) Techniques -- Chapter 2. Exploring Social Engineering Attacks Involving Insights From Case Studies -- Chapter 3. Social Engineering in the Digital Age: A Critical Examination of Attack Techniques, Consequences, and Preventative Measures -- Chapter 4. Cybersecurity in the Age of Social Engineering: Implementing Effective Defense Strategies -- Chapter 5. Exploration of Social Engineering in the Digital Era of Stealth -- Chapter 6. Empowering Cyber Resilience: Effective Strategies for Combating Social Engineering Threats -- Chapter 7. Securing the Weakest Link: Compressive Approaches to Social Engineering Attack Prevention -- Chapter 8. Protecting Against Social Engineering Using Wireshark: Effective Strategies With Real-World Examples -- Chapter 9. Emerging Trends and Future Directions in Social Engineering Defense -- Chapter 10. Exploring the Future Landscape: Emerging Trends in Social Engineering Defense -- Chapter 11. A Comprehensive Guide to Blockchain Technology and Its Role in Enhancing Cyber Security and Combating Social Engineering -- Chapter 12. Social Engineering in Social Media and Online Interactions -- Chapter 13. The Use of Deep Fakes in Social Engineering Attacks: A Case Study on Social Media Engagements -- Chapter 14. The Rising Threat of Deepfake Technology and Frightening Advancementsof Social Engineering -- Chapter 15. Phishing Detection System Using Machine Learning -- Chapter 16. Assortment of Social Engineering Attacks in the New Digital Era -- Compilation of References -- About the Contributors -- Index.
    Subject: Social engineering. -
    Online resource: https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-6665-3
    ISBN: 9798369366677
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9521101 電子資源 11.線上閱覽_V 電子書 EB HM668 .E34 2025eb 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login