Critical phishing defense strategies and digital asset protection / [edited by] Brij B. Gupta, Asia University, Taiwan.

Other author Gupta, Brij B., 1982
Format Electronic
Publication InfoHershey PA : IGI Global Scientific Publishing, [2025]
Descriptionxviii, 416 pages illustrations 29 cm
Supplemental ContentFull text available from InfoSci-Books
Subjects

Physical mediumillustrations
Contents Anti-phishing technologies and tools / Jampula Navaneeth, Mosiur Rahaman -- Phishing prevention solutions and mechanisms / Abhavya Muku, Sunil Singh, Sudhakar Kumar, Ankita Sharma, Pooja Rai, Biraj Upadhyaya -- Methodological insights into mobile and social media phishing / Ananya Jha, Amaresh Jha -- Legal, ethical, and marketing considerations in phishing defense / David López Jiménez, Eduardo Dittmar, Jenny Vargas Portillo -- Advanced techniques and best practices for phishing detection / Ravina Mittal, Sunil Singh, Sudhakar Kumar, Trannum Khullar, Rakesh Kumar, Brij Gupta, Konstantinos Psannis -- Introduction to phishing and digital asset threats / Munawar Munawar -- Comprehensive phishing defense strategies / Raj Kanwar, Sumit Bawa, Sunil Singh, Sudhakar Kumar, Chandra Subba, Varsha Arya, Abhay Ratnaparkhi -- Psychological triggers in phishing attacks a conceptual analysis for improved defence strategies / Jagruti Patni, Apra Sharma, Naveen Kumar Singh -- Optimizing data privacy and scalability in health monitoring : leveraging, encryption, blockchain, and cloud technologies / Kothai G, Harish P, Mugesh kannan S, Ajinesh D, Sathyanarayanan V -- Cybersecurity in the age of AI-enhancing defences for today's threats / Rohini Tarade, Susanta Das -- Critical phishing defense strategies and digital asset protection / Priyanka v, Priyanka Gopi -- Anti-phishing tools and technologies / Kashish Preet Kaur Kaur, Sunil Singh, Sudhakar Kumar, Ishita Mehra, Shavi Bansal, Kwok Chui -- Identity and access management (IAM), a critical line of defense for phishing prevention and risk mitigation / Anant Wairagade -- Critical phishing defense strategies and digital asset protection : the role of cryptography in protecting digital asset / Dwi Sartika -- Cyber security in the context of cloud computing : an empirical study of Australian SMEs / Ruwan Nagahawatta, Matthew Warren, Scott Salzman, Sachithra Lokuge -- Social engineering and psychological manipulation in phishing / Gerry Firmansyah.
Abstract "This book covers the fundamentals of phishing, including common tactics and techniques used by attackers. It then progresses to explore advanced detection and prevention methods, offering practical solutions and best practices for defending against these malicious activities"-- Provided by publisher.
Bibliography noteIncludes bibliographical references (pages 359-405) and index.
Access restrictionAvailable only to authorized users.
Technical detailsMode of access: World Wide Web
Genre/formElectronic books.
LCCN 2024054412
ISBN9798369387849 hardcover
ISBN9798369387856 paperback
ISBNebook

Availability

Library Location Call Number Status Item Actions
Electronic Resources Access Content Online ✔ Available