Phishing for Answers
Phishing for Answers
Risk identification and mitigation strategies
Shaw, Lawrence E.; Merz, Terry R.
Institution of Engineering and Technology
11/2024
324
Dura
9781839536670
Pré-lançamento - envio 15 a 20 dias após a sua edição
Chapter 2: The User and Context
Chapter 3: The Technology Comfort Experience
Chapter 4: Failing to Regulate the Ascriptions of Threats/Vulnerability Knowledge to Technology
Chapter 5: Assessing the Phishing Risk
Chapter 6: The Organisation is at Risk: Start Where you Are
Chapter 7: Training Efficacy Versus Direct Experience and Introspection
Chapter 8: Addressing Social Media Presence
Chapter 9: Technology Solutions
Chapter 10: Some Extras: Case Studies
Chapter 11: Conclusions
Chapter 2: The User and Context
Chapter 3: The Technology Comfort Experience
Chapter 4: Failing to Regulate the Ascriptions of Threats/Vulnerability Knowledge to Technology
Chapter 5: Assessing the Phishing Risk
Chapter 6: The Organisation is at Risk: Start Where you Are
Chapter 7: Training Efficacy Versus Direct Experience and Introspection
Chapter 8: Addressing Social Media Presence
Chapter 9: Technology Solutions
Chapter 10: Some Extras: Case Studies
Chapter 11: Conclusions