Books on the topic 'Phishing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Phishing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Jakobsson, Markus, and Steven Myers, eds. Phishing and Countermeasures. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2006. http://dx.doi.org/10.1002/0470086106.
Full textHadnagy, Christopher, and Michele Fincher. Phishing Dark Waters. Indianapolis, Indiana, USA: John Wiley & Sons, Inc, 2015. http://dx.doi.org/10.1002/9781119183624.
Full textSonowal, Gunikhan. Phishing and Communication Channels. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7744-7.
Full text1952-, Vines Russell Dean, ed. Phishing: Cutting the identity theft line. Indianapolis, IN: Wiley Pub., 2005.
Find full textUnited States. Federal Trade Commission. Office of Consumer and Business Education., ed. Cómo evitar que lo 'pesquen' con una red de estafa electrónica. [Washington, D.C.]: Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, 2005.
Find full textBudnick, Dean. The Phishing manual: A compendium to the music of Phish. New York: Hyperion, 1996.
Find full textBudnick, Dean. The Phishing manual: A compendium to the music of Phish. New York: Hyperion, 1996.
Find full textOrganisation for Economic Co-operation and Development., ed. Online identity theft. Paris: OECD, 2009.
Find full textOrganisation for Economic Co-operation and Development., ed. Online identity theft. Paris: OECD, 2009.
Find full textFincher, Michele. Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails. Indianapolis, IN, USA: Jon Wiley & Sons, Inc., 2015.
Find full textUnited States. Federal Trade Commission. Division of Consumer and Business Education. Text messages from your bank?: Sounds "phishy". Washington, D.C.]: Federal Trade Commission, Bureau of Consumer Protection, Division of Consumer & Business Education, 2009.
Find full textHandbook of eID security: Concepts, practical experiences, technologies. Erlangen: Publicis, 2011.
Find full textICANN and the WHOIS database: Providing access to protect consumers from phishing : hearing before the Subcommittee on Financial Institutions and Consumer Credit of the Committee on Financial Services, U.S. House of Representatives, One Hundred Ninth Congress, second session, July 18, 2006. Washington: U.S. G.P.O., 2007.
Find full textChungguk tongbuk chiyŏk Han'guk kwallyŏn mayak pŏmjoe wa poisŭ p'ising pŏmjoe ŭi sit'ae mit taeŭng pangan e kwanhan yŏn'gu: The research and legal studies on the policy and the trends of drug and voice phishing crime related to Korean in northeast China. Sŏul T'ŭkpyŏlsi: Han'guk Hyŏngsa Chŏngch'aek Yon'guwŏn., 2014.
Find full textVines, Russell Dean, and Rachael Lininger. Phishing. Wiley & Sons, Incorporated, John, 2005.
Find full textPhishing Exposed. Elsevier, 2006. http://dx.doi.org/10.1016/b978-1-59749-030-6.x5000-4.
Full textJames, Lance, and Dave Jevans. Phishing Exposed. Elsevier Science & Technology Books, 2005.
Find full textPinchot, Bronson, and Robert J. Shiller George A. Akerlof. Phishing for Phools. Audible Studios on Brilliance Audio, 2016.
Find full textPhishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks. Apress L. P., 2021.
Find full textAtkins, Mr Christopher. Phishing Attacks: Advanced Attack Techniques. CreateSpace Independent Publishing Platform, 2018.
Find full textMitra, Amrita. Phishing: Detection, Analysis and Prevention. Independently Published, 2019.
Find full textVines, Russell Dean, and Rachael Lininger. Phishing: Cutting the Identity Theft Line. Wiley, 2005.
Find full textVines, Russell Dean, and Rachael Lininger. Phishing: Cutting the Identity Theft Line. Wiley & Sons, Incorporated, John, 2008.
Find full textKhandelwal, Shekhar, and Rik Das. Phishing Detection Using Content Based Image Classification. Taylor & Francis Group, 2022.
Find full textKhandelwal, Shekhar, and Rik Das. Phishing Detection Using Content Based Image Classification. CRC Press LLC, 2022.
Find full textKhandelwal, Shekhar, and Rik Das. Phishing Detection Using Content Based Image Classification. Taylor & Francis Group, 2022.
Find full textKhandelwal, Shekhar, and Rik Das. Phishing Detection Using Content Based Image Classification. Taylor & Francis Group, 2022.
Find full textKhandelwal, Shekhar, and Rik Das. Phishing Detection Using Content Based Image Classification. Taylor & Francis Group, 2022.
Find full textFazeldehkordi, E., I. S. Amiri, and O. A. Akanbi. Machine-Learning Approach to Phishing Detection and Defense. Elsevier Science & Technology Books, 2014.
Find full textCómo evitar que lo 'pesquen' con una red de estafa electrónica. [Washington, D.C.]: Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, 2005.
Find full textPhishing for Phools: The Economics of Manipulation and Deception. Princeton University Press, 2016.
Find full textA Machine-Learning Approach to Phishing Detection and Defense. Elsevier, 2015. http://dx.doi.org/10.1016/c2014-0-03762-8.
Full textauthor, Shiller Robert J., ed. Phishing for phools: The economics of manipulation and deception. 2015.
Find full textShiller, Robert J., and George A. Akerlof. Phishing for Phools: The Economics of Manipulation and Deception. Princeton University Press, 2015.
Find full textSteinberg, Shirley R., Dennis Carlson, Robert Lake, and Michael B. MacDonald. History of Progressive Music and Youth Culture: Phishing in America. Lang AG International Academic Publishers, Peter, 2020.
Find full textHistory of Progressive Music and Youth Culture: Phishing in America. Lang AG International Academic Publishers, Peter, 2020.
Find full textSteinberg, Shirley R., Dennis Carlson, Robert Lake, and Michael B. MacDonald. History of Progressive Music and Youth Culture: Phishing in America. Lang AG International Academic Publishers, Peter, 2020.
Find full textSteinberg, Shirley R., Dennis Carlson, Robert Lake, and Michael B. MacDonald. History of Progressive Music and Youth Culture: Phishing in America. Lang AG International Academic Publishers, Peter, 2020.
Find full textSteinberg, Shirley R., Dennis Carlson, Robert Lake, and Michael B. MacDonald. History of Progressive Music and Youth Culture: Phishing in America. Lang AG International Academic Publishers, Peter, 2020.
Find full textCostabile, Gerardo, and Ilenia Mercuri. Fattore Umano Nella Cybersecurity: Phishing, Social Engineering e Mind Hacking. Independently Published, 2018.
Find full textOrganisation for Economic Co-operation and Development., ed. Online identity theft. Paris: OECD, 2009.
Find full textHadnagy, Christopher, Robin Dreeke, and Michele Fincher. Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails. Wiley & Sons, Incorporated, John, 2015.
Find full textHadnagy, Christopher, Robin Dreeke, and Michele Fincher. Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails. Wiley & Sons, Limited, John, 2015.
Find full textMarlins Cry a Phishing Story: The Digital Damnation of Civilized Society. Cutting Edge Communications, Incorporated, 2012.
Find full text