To see the other types of publications on this topic, follow the link: Phishing.

Books on the topic 'Phishing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Phishing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Lininger, Rachel. Phishing. New York: John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jakobsson, Markus, and Steven Myers, eds. Phishing and Countermeasures. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2006. http://dx.doi.org/10.1002/0470086106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hadnagy, Christopher, and Michele Fincher. Phishing Dark Waters. Indianapolis, Indiana, USA: John Wiley & Sons, Inc, 2015. http://dx.doi.org/10.1002/9781119183624.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sonowal, Gunikhan. Phishing and Communication Channels. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7744-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gundar, Ud. Dag ba-reshet: Phishing. Ḳiryat Gat: Ḳorʼim, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

1952-, Vines Russell Dean, ed. Phishing: Cutting the identity theft line. Indianapolis, IN: Wiley Pub., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States. Federal Trade Commission. Office of Consumer and Business Education., ed. Cómo evitar que lo 'pesquen' con una red de estafa electrónica. [Washington, D.C.]: Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Budnick, Dean. The Phishing manual: A compendium to the music of Phish. New York: Hyperion, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Budnick, Dean. The Phishing manual: A compendium to the music of Phish. New York: Hyperion, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Organisation for Economic Co-operation and Development., ed. Online identity theft. Paris: OECD, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Organisation for Economic Co-operation and Development., ed. Online identity theft. Paris: OECD, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Fincher, Michele. Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails. Indianapolis, IN, USA: Jon Wiley & Sons, Inc., 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

United States. Federal Trade Commission. Division of Consumer and Business Education. Text messages from your bank?: Sounds "phishy". Washington, D.C.]: Federal Trade Commission, Bureau of Consumer Protection, Division of Consumer & Business Education, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Handbook of eID security: Concepts, practical experiences, technologies. Erlangen: Publicis, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

ICANN and the WHOIS database: Providing access to protect consumers from phishing : hearing before the Subcommittee on Financial Institutions and Consumer Credit of the Committee on Financial Services, U.S. House of Representatives, One Hundred Ninth Congress, second session, July 18, 2006. Washington: U.S. G.P.O., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Chungguk tongbuk chiyŏk Han'guk kwallyŏn mayak pŏmjoe wa poisŭ p'ising pŏmjoe ŭi sit'ae mit taeŭng pangan e kwanhan yŏn'gu: The research and legal studies on the policy and the trends of drug and voice phishing crime related to Korean in northeast China. Sŏul T'ŭkpyŏlsi: Han'guk Hyŏngsa Chŏngch'aek Yon'guwŏn., 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Vines, Russell Dean, and Rachael Lininger. Phishing. Wiley & Sons, Incorporated, John, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Phishing Exposed. Elsevier, 2006. http://dx.doi.org/10.1016/b978-1-59749-030-6.x5000-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

James, Lance, and Dave Jevans. Phishing Exposed. Elsevier Science & Technology Books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Phishing Exposed. Syngress, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Pinchot, Bronson, and Robert J. Shiller George A. Akerlof. Phishing for Phools. Audible Studios on Brilliance Audio, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Williams, Marisa. Phishing for Normalcy. Lulu Press, Inc., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks. Apress L. P., 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Ronda, Troy. iTrustPage: Pretty good phishing protection. 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Atkins, Mr Christopher. Phishing Attacks: Advanced Attack Techniques. CreateSpace Independent Publishing Platform, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Mitra, Amrita. Phishing: Detection, Analysis and Prevention. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Vines, Russell Dean, and Rachael Lininger. Phishing: Cutting the Identity Theft Line. Wiley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Vines, Russell Dean, and Rachael Lininger. Phishing: Cutting the Identity Theft Line. Wiley & Sons, Incorporated, John, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Khandelwal, Shekhar, and Rik Das. Phishing Detection Using Content Based Image Classification. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Khandelwal, Shekhar, and Rik Das. Phishing Detection Using Content Based Image Classification. CRC Press LLC, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Khandelwal, Shekhar, and Rik Das. Phishing Detection Using Content Based Image Classification. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Khandelwal, Shekhar, and Rik Das. Phishing Detection Using Content Based Image Classification. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Khandelwal, Shekhar, and Rik Das. Phishing Detection Using Content Based Image Classification. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Fazeldehkordi, E., I. S. Amiri, and O. A. Akanbi. Machine-Learning Approach to Phishing Detection and Defense. Elsevier Science & Technology Books, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Cómo evitar que lo 'pesquen' con una red de estafa electrónica. [Washington, D.C.]: Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Phishing for Phools: The Economics of Manipulation and Deception. Princeton University Press, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

A Machine-Learning Approach to Phishing Detection and Defense. Syngress, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

A Machine-Learning Approach to Phishing Detection and Defense. Elsevier, 2015. http://dx.doi.org/10.1016/c2014-0-03762-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

author, Shiller Robert J., ed. Phishing for phools: The economics of manipulation and deception. 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Shiller, Robert J., and George A. Akerlof. Phishing for Phools: The Economics of Manipulation and Deception. Princeton University Press, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Steinberg, Shirley R., Dennis Carlson, Robert Lake, and Michael B. MacDonald. History of Progressive Music and Youth Culture: Phishing in America. Lang AG International Academic Publishers, Peter, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

History of Progressive Music and Youth Culture: Phishing in America. Lang AG International Academic Publishers, Peter, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Steinberg, Shirley R., Dennis Carlson, Robert Lake, and Michael B. MacDonald. History of Progressive Music and Youth Culture: Phishing in America. Lang AG International Academic Publishers, Peter, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Steinberg, Shirley R., Dennis Carlson, Robert Lake, and Michael B. MacDonald. History of Progressive Music and Youth Culture: Phishing in America. Lang AG International Academic Publishers, Peter, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Steinberg, Shirley R., Dennis Carlson, Robert Lake, and Michael B. MacDonald. History of Progressive Music and Youth Culture: Phishing in America. Lang AG International Academic Publishers, Peter, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Costabile, Gerardo, and Ilenia Mercuri. Fattore Umano Nella Cybersecurity: Phishing, Social Engineering e Mind Hacking. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Organisation for Economic Co-operation and Development., ed. Online identity theft. Paris: OECD, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Hadnagy, Christopher, Robin Dreeke, and Michele Fincher. Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails. Wiley & Sons, Incorporated, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Hadnagy, Christopher, Robin Dreeke, and Michele Fincher. Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails. Wiley & Sons, Limited, John, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Marlins Cry a Phishing Story: The Digital Damnation of Civilized Society. Cutting Edge Communications, Incorporated, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography