Get Free Shipping on orders over $79
Malware Profiling : Exploiting and Defending Human Targets through Computer-Mediated Communications - Cameron Malin
eTextbook alternate format product

Instant online reading.
Don't wait for delivery!

Go digital and save!

Malware Profiling

Exploiting and Defending Human Targets through Computer-Mediated Communications

By: Cameron Malin

Paperback | 23 June 2017 | Edition Number 1

At a Glance

Paperback


RRP $109.95

$99.75

or 4 interest-free payments of $24.94 with

 or 

Ships in 5 to 7 business days

Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communication guides readers through the fascinating history and principles of deception-and how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory and narrative bases of misdirection, used to shape the targeted audience's perceptions and beliefs.

The text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks-and conversely postmortem insight about attackers-presenting a unique resource that empowers readers to observe, understand and protect against cyber deception tactics.

Written by information security experts with real-world investigative experience, the text is the most instructional book available on the subject, providing practical guidance to readers with rich literature references, diagrams and examples that enhance the learning process.

  • Deeply examines the psychology of deception through the lens of misdirection and other techniques used by master magicians
  • Explores cognitive vulnerabilities that cyber attackers use to exploit human targets
  • Dissects the underpinnings and elements of deception narratives
  • Examines group dynamics and deception factors in cyber attacker underground markets
  • Provides deep coverage on how cyber attackers leverage psychological influence techniques in the trajectory of deception strategies
  • Explores the deception strategies used in today's threat landscape-phishing, watering hole, scareware and ransomware attacks
  • Gives unprecedented insight into deceptive Internet video communications
  • Delves into the history and deception pathways of nation-state and cyber terrorism attackers
  • Provides unique insight into honeypot technologies and strategies
  • Explores the future of cyber deception

More in Technology in General

Technologies for Children : 3rd Edition - Marilyn Fleer

RRP $92.95

$78.75

15%
OFF
Mathematics for Technicians : 7th Edition - Blair Alldis

RRP $94.95

$92.75

Modern Engineering Mathematics : 6th Edition - Glyn James

RRP $145.90

$112.75

23%
OFF
Source Code : My Beginnings - Bill Gates

RRP $29.99

$24.99

17%
OFF
Burn Book - Kara Swisher

Paperback

RRP $34.99

$28.75

18%
OFF
The Design of Everyday Things : Revised and Expanded Edition - Don Norman
The C Programming Language : Prentice Hall Software - Brian Kernighan

RRP $107.04

$75.75

29%
OFF
Thing Explainer : Complicated Stuff in Simple Words - Randall Munroe
Green Technology and Industry 4.0 for Sustainable Future - Sheila Mahapatra
Operational Modal Analysis : Developments and Applications - Mohammad Noori
Redefining Innovative Practices in the Age of AI - Binkey Srivastava

RRP $336.00

$289.75

14%
OFF
Molecular Breeding and Bioinformatics - Jitendra Kumar

RRP $431.00

$368.75

14%
OFF
Nanocomposites and Nanomaterials in Biomedical Applications - Vivek Dave
How a Game Lives - Jacob Geller

RRP $49.99

$38.75

22%
OFF
Principles of Modern Grinding Technology - W. Brian  Rowe

RRP $436.95

$385.75

12%
OFF