logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications by Cameron H. Malin, Terry Gudaitis, Thomas Holt, Max Kilger ISBN 9780124116306, 9780124116399, 0124116302, 0124116396

  • SKU: EBN-6614164
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

5.0

22 reviews
Instant download (eBook) Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications after payment.
Authors:Cameron H. Malin, Terry Gudaitis, Thomas Holt, Max Kilger
Pages:284 pages.
Year:2017
Editon:1st
Publisher:Academic Press
Language:english
File Size:19.02 MB
Format:pdf
ISBNS:9780124116306, 9780124116399, 0124116302, 0124116396
Categories: Ebooks

Product desciption

(Ebook) Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications by Cameron H. Malin, Terry Gudaitis, Thomas Holt, Max Kilger ISBN 9780124116306, 9780124116399, 0124116302, 0124116396

Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communicationguides readers through the fascinating history and principles of deception—and how these techniques and stratagems are now being effectively used by cyber attackers. Users will find an in-depth guide that provides valuable insights into the cognitive, sensory and narrative bases of misdirection, used to shape the targeted audience’s perceptions and beliefs.

The text provides a detailed analysis of the psychological, sensory, sociological, and technical precepts that reveal predictors of attacks—and conversely postmortem insight about attackers—presenting a unique resource that empowers readers to observe, understand and protect against cyber deception tactics.

Written by information security experts with real-world investigative experience, the text is the most instructional book available on the subject, providing practical guidance to readers with rich literature references, diagrams and examples that enhance the learning process.

*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products