000 | 03946nam a22006618i 4500 | ||
---|---|---|---|
001 | BDZ0050255835 | ||
003 | StDuBDS | ||
005 | 20230331113849.0 | ||
006 | m|||||o||d|||||||| | ||
007 | cr ||||||||||| | ||
008 | 220413s2022 enk fo 000|0|eng|d | ||
020 |
_a9781780175867 (PDF ebook) : _c22.49 |
||
040 |
_aStDuBDS _beng _erda _epn _cStDuBDS _dStDuBDSZ |
||
072 | 7 |
_aCRI _2ukslc |
|
072 | 7 |
_aJK _2bicssc |
|
072 | 7 |
_aURH _2bicssc |
|
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aURJ _2bicssc |
|
072 | 7 |
_aURS _2bicssc |
|
072 | 7 |
_aURW _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aJK _2thema |
|
072 | 7 |
_aURH _2thema |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aURJ _2thema |
|
072 | 7 |
_aURS _2thema |
|
072 | 7 |
_aURW _2thema |
|
072 | 7 |
_aURY _2thema |
|
072 | 7 |
_aURD _2thema |
|
082 | 0 | 4 |
_a364.163 _223 |
100 | 1 |
_aWade, Todd, _eauthor. |
|
245 | 1 | 0 |
_aCybercrime : _bprotecting your business, your family and yourself / _cTodd Wade. |
263 | _a202206 | ||
264 | 1 |
_aLondon : _bBCS, _c2022. |
|
300 | _a1 online resource (180 pages) | ||
336 |
_atext _2rdacontent |
||
337 |
_acomputer _2rdamedia |
||
338 |
_aonline resource _2rdacarrier |
||
366 |
_b20220615 _cAvailable |
||
505 | 0 | _aIntroduction -- Impersonation Cyber Frauds -- Cyber Advance-fee Threats -- Cyber Investment Fraud -- Cyber Identity Theft -- Cyber Extortion -- Cyber Sextortion -- Conclusion | |
520 | 8 |
_aWith a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods to impact, with the use of real-world case studies alongside practical suggestions on preventative measures, warning signs of cybercrime and next steps if you find yourself a victim. _bCybercrime is a sad, ever-developing reality of our digital lives. Cybercriminals are ruthless and know how to use persuasion and manipulation to get what they want. We are all in danger of falling victim to their tricks, which can lead to serious consequences for our business, our family and ourselves. Cybercrime is a broad topic. This book isn't an attempt to cover all types of cybercrime. It will cover the two most common and most costly types of cybercrime seen today for individuals and businesses: cyber fraud and cyber extortion. There are four categories of cyber fraud (impersonation fraud, advance- fee fraud, investment fraud, identity theft) and two categories of cyber extortion (cyber extortion and sextortion). There's a chapter for each of these categories, with coverage including key methodologies, attack methods cybercriminals use, advice on how to protect yourself to avoid becoming a victim, and what to do if you do find yourself in the situation of being a victim of cybercrime. Historical examples of the type of fraud or extortion will be shown, explaining and demonstrating how the same methods are still in use today, albeit in a modern context - cyber. Real cases of cybercrime will be reviewed and dissected. Glimpses of how future attacks might look will be shown. Cybercriminals target everyone. It does not matter if you are at work or at home. They will go after your family, including your children. Reading this book will help you to be prepared for when that occurs. |
|
588 | _aDescription based on CIP data; resource not viewed. | ||
650 | 0 | _aComputer fraud. | |
650 | 0 | _aInternet fraud. | |
650 | 0 | _aComputer crimes. | |
650 | 7 |
_aTrue Crime. _2ukslc |
|
650 | 7 |
_aSocial services & welfare, criminology _2thema |
|
650 | 7 |
_aComputer fraud & hacking _2thema |
|
650 | 7 |
_aComputer security _2thema |
|
650 | 7 |
_aComputer viruses, Trojans & worms _2thema |
|
650 | 7 |
_aSpam _2thema |
|
650 | 7 |
_aSpyware _2thema |
|
650 | 7 |
_aData encryption _2thema |
|
650 | 7 |
_aPrivacy & data protection _2thema |
|
776 | 0 | 8 |
_iPrint version : _z9781780175850 |
856 | 4 | 0 |
_uhttps://www.vlebooks.com/vleweb/product/openreader?id=WestLondon&accId=8832856&isbn=9781780175867 _zOpen e-book |
942 | _2ddc | ||
999 |
_c83152 _d83152 |