Listing 1 - 10 of 31 << page
of 4
>>
Sort by

Book
Cómo evitar que lo 'pesquen' con una red de estafa electrónica
Author:
Year: 2005 Publisher: [Washington, D.C.] : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Periodical
Beware of phishing schemes : cuidado con estafas de phishing.
Author:
Year: 2006 Publisher: Washington, D.C. : Dept. of the Treasury, Internal Revenue Service,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Phishing --- Identity theft


Book
How not to get hooked by a 'phishing' scam
Author:
Year: 2006 Publisher: [Washington, D.C.] : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer & Business Education,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Phishing. --- Internet fraud.


Book
"Phishing" fraud : how to avoid getting fried by phony phishermen
Author:
Year: 2007 Publisher: [Washington, D.C.] : U.S. Securities and Exchange Commission,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Fake credit report sites : cashing in on your personal information.
Author:
Year: 2003 Publisher: [Washington, D.C.] : Federal Trade Commission, Bureau of Consumer Protection, Division of Consumer and Business Education,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Bank failures, mergers, and takeovers : a "phish-erman's special."
Author:
Year: 2008 Publisher: [Washington, D.C.] : Federal Trade Commission, Bureau of Consumer Protection, Division of Consumer & Business Education,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Sitios web falsos de informes de crédito : sacándole dinero a su información = Fake credit report sites : cashing in on your personal information.
Author:
Year: 2003 Publisher: [Washington, D.C.] : Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer & Business Education,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Quiebras, fusiones y adquisiciones de bancos : el plato del día de los "pescadores de información" = Bank failures, mergers, and takeovers : a 'phish-erman's special."
Author:
Year: 2008 Publisher: [Washington, D.C.] : Comisión Federal de Comercio, Buró de Protección del Consumidor, División de Educación del Consumidor y los Negocios,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Building an effective security program.
Authors: --- ---
ISBN: 1501506528 1501506420 Year: 2020 Publisher: Boston, Massachusetts : DE GRUYTER,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable. This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against today’s persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT security topics: IT Security Mindset—Think like an IT security professional, and consider how your IT environment can be defended against potential cyberattacks. Risk Management—Identify the assets, vulnerabilities and threats that drive IT risk, along with the controls that can be used to mitigate such risk. Effective Cyberdefense—Consider the components of an effective organization cyberdefense to successfully protect computers, devices, networks, accounts, applications and data. Cyber Operations—Operate cyberdefense capabilities and controls so that assets are protected, and intruders can be detected and repelled before significant damage can be done. IT Security Awareness and Training—Promote effective cybersecurity practices at work, on travel, and at home, among your organization’s business leaders, IT professionals, and staff. Resilient IT Security—Implement, operate, monitor, assess, and improve your cybersecurity program on an ongoing basis to defend against the cyber threats of today and the future.


Book
Hijacking our heroes : exploiting veterans through disinformation on social media : report of the Committee on Veterans' Affairs together with dissenting views.
Author:
Year: 2020 Publisher: Washington : U.S. Government Publishing Office,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 31 << page
of 4
>>
Sort by