Search:

Fancy Bear goes phishing : the dark history of the information age, in five extraordinary hacks / by Shapiro, Scott J.,author.;
Includes bibliographical references (pages 331-402) and index."A law professor and computer expert's take on how hacks happen and how the Internet can be made more secure"--
Subjects: Case studies.; Hacking.; Hacking; Internet in espionage.; Internet; Phishing.; Phishing;
Available copies: 1 / Total copies: 1
unAPI

How to catch a phish : a practical guide to detecting phishing emails / by Oles, Nicholas,author.;
Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization and individual with an email account is susceptible to deceptive emails sent by attackers with nefarious intentions. This activity, known as phishing, involves an attacker attempting to lure individuals into providing sensitive information or performing a predetermined action. Attacks vary in sophistication, but the core skills and process to detect, analyze, and respond to a suspicious message does not change. Attackers have preyed on victims with convincing and not-so-convincing phishing emails to gain initial footholds into networks around the world for over 30 years. This attack method has been rapidly growing in popularity and continues to be the number one method that organizations and individuals struggle to defend against. Regardless of what any vendor or organization will tell you, no infallible tool exists to eliminate this threat completely. This book teaches you how to analyze suspicious messages using free tools and resources. You will understand the basics of email, tactics used by attackers, and a repeatable process to systematically analyze messages and respond to suspicious activity. You Will Learn How to: Safely save email messages as attachments for analysis; Identify what information is in an email header; Review header information and extract key indicators or patterns used for detection; Identify signs of a suspicious or malicious email message; Detect the tactics that attackers use in phishing emails; Safely examine email links and attachments; Use a variety of free and simple tools to analyze email messages.
Subjects: Electronic mail messages; Phishing;
Available copies: 1 / Total copies: 1
unAPI

Dot.con : the art of scamming a scammer / by Veitch, James(Comedian),author.;
"The Nigerian prince eager to fork over his inheritance, the family friend stranded unexpectedly in Norway, the lonely Russian beauty looking for love--they spam our inboxes with their hapless pleas for help, money, and our Social Security number. In Dot.con, Veitch finally answers the question: what would happen if you replied?"--Back cover.
Subjects: Computer fraud; Electronic mail messages; Phishing; Spam (Electronic mail);
Available copies: 1 / Total copies: 1
unAPI

The Beekeeper [videorecording] / by Wimmer, Kurt,1964-screenwriter,film producer.; Ayer, David,film director,film producer.; Driver, Minnie,actor.; Hutcherson, Josh,actor.; Irons, Jeremy,1948-actor.; Naderi, Bobby,1984-actor.; Rashad, Phylicia,1948-actor.; Raver-Lampman, Emmy,actor.; Redgrave, Jemma,actor.; Statham, Jason,1967-actor,film producer.; Witts, David,1991-actor.; Videoville Showtime,film distributor.;
Jason Statham, Emmy Raver-Lampman, Bobby Naderi, Josh Hutcherson, Jeremy Irons, David Witts, Phylicia Rashad, Jemma Redgrave, Minnie Driver.One man's brutal campaign for vengeance takes on national dangers after he is revealed to be a former operative of a powerful and covert organization known as "Beekeepers."Canadian Home Video Rating: 14A.MPAA rating: R.DVD ; wide screen presentation ; Dolby Digital 5.1.
Subjects: Video recordings for the hearing impaired.; Action and adventure films.; Feature films.; Intelligence officers; Revenge; Beekeepers; Phishing; Landladies; Man-woman relationships;
For private home use only.
Available copies: 2 / Total copies: 2
unAPI