logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Understanding Social Engineering Based Scams 1st Edition Markus Jakobsson Eds

  • SKU: BELL-5604616
Understanding Social Engineering Based Scams 1st Edition Markus Jakobsson Eds
$ 31.00 $ 45.00 (-31%)

5.0

18 reviews

Understanding Social Engineering Based Scams 1st Edition Markus Jakobsson Eds instant download after payment.

Publisher: Springer-Verlag New York
File Extension: PDF
File size: 3.46 MB
Pages: 135
Author: Markus Jakobsson (eds.)
ISBN: 9781493964550, 9781493964574, 1493964550, 1493964577
Language: English
Year: 2016
Edition: 1

Product desciption

Understanding Social Engineering Based Scams 1st Edition Markus Jakobsson Eds by Markus Jakobsson (eds.) 9781493964550, 9781493964574, 1493964550, 1493964577 instant download after payment.


This book describes trends in email scams and offers tools and techniques

to identify such trends. It also describes automated countermeasures

based on an understanding of the type of persuasive methods used by

scammers. It reviews both consumer-facing scams and enterprise scams,

describing in-depth case studies relating to Craigslist scams and Business

Email Compromise Scams. This book provides a good starting point for

practitioners, decision makers and researchers in that it includes

alternatives and complementary tools to the currently deployed email

security tools, with a focus on understanding the metrics of scams.

Both professionals working in security and advanced-level students

interested in privacy or applications of computer science will find this book

a useful reference.


Related Products