feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_9949232551902882
    Format: 1 online resource (286 pages)
    ISBN: 0-12-411639-6 , 0-12-411630-2
    Note: Front Cover -- Deception in the Digital Age -- Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications -- Copyright -- Dedication -- Contents -- About the Authors -- Acknowledgments -- Introduction: Cyberanthropology of Deception -- The Digital Evolution: Cyberanthropology of Deception -- How to Use This Book -- References -- 1 - The Psychology of Deception -- Misdirection and the Psychological Principles Behind Effective Magic -- Active and Passive Misdirection: Factors Toward Influence by Suggestion -- General, Particular, and Post Misdirection -- Misdirection Through Disguise and Attention Control -- Physical and Psychological Misdirection -- Exploiting False Assumptions: Assumptive, One-Point, and Two-Point Misdirection -- Misdirection Through Message Construction and Conveyance: Attitude, Transference, Repetition, Verbal/Nonverbal -- Misdirection Through Distraction, Diversion, or Relaxation -- Degrees of Misdirection -- Magician's Weapons of Deception -- Direct Forcing -- Indirect Forcing -- Magic, Illusion, and the Prevalence of Deception -- Neuropsychology of Magic and Deception -- Early Attempts at Explaining Digital Deception -- Traditional Deception Research via Verbal and Nonverbal Cues -- Deception Detection Through the Analysis of Words and Images -- Deception Through the Practice of Social Engineering -- The Psychology of Deception -- Summary -- References -- 2 - Virtual Myths: Internet Urban Legend, Chain Letters, and Warnings -- Urban Myths and Legends -- Elements of Urban Legends -- Urban Myths Online -- Traditional Chain Letters -- Hoax Messages -- Scare Chains -- Threat Chains -- Weaponizing Online Urban Legends, Hoaxes, and Chain Communications -- Defending Against Online Urban Legends, Chains, and Hoax Communications -- Element Analysis. , Open Source Intelligence Analysis -- References -- 3 - Viral Influence: Deceptive Computing Attacks Through Persuasion -- Psychological Principles of Influence -- Factors, Sequence, and Timing of Persuasive Communications -- Dual Process Models -- The Yale Information Processing Model -- The Objectives of Persuasive Communications -- Social Influence and Persuasion in Computer-Mediated Communications -- Social Influence Over Computer-Mediated Communications and Digital Platforms -- Adapting Traditional Social Cues Communicator Salience -- Persuasive Technology -- Deceptive Computing Attacks Through Persuasion -- Hoax Virus Communications -- Principles of Persuasion in Hoax Virus Narratives -- Scareware -- Principles of Persuasion in Scareware Attack "Storyboards" -- Tech Support Scams -- Principles of Persuasion in Tech Support Scam "Storyboards" -- Ransomware -- Principles of Persuasion in Ransomware Attacks -- The Future of Viral Influence -- Conclusion -- References -- 4 - Social Dynamics of Deception: Cyber Underground Markets and Cultures -- Social Dynamics in Computer-Mediated Communications -- The Process of Buying and Selling -- Trust Inducing Mechanisms -- Subcultural Norms and the Role of Trust -- No Honor Among Cyber Thieves: Deception Within Underground Markets -- Virtual False Flags -- Sock Puppets -- Persuasive Technology -- Impersonation -- Attacking Trust Within Underground Markets -- References -- 5 - Phishing, Watering Holes, and Scareware -- Phishing -- Watering Hole Attacks (Strategic Web Compromises) -- The Watering Hole Attack Deception Chain -- Passive Misdirection -- Technical Persuasion -- Scareware -- Ransomware -- Social Engineering -- References -- 6 - Seeing is Not Believing: Deceptive Internet Video Communications -- A Bit of History -- One of Photography's Early Deceptions -- Film Fakes -- Video Software and Tools. , Deciphering Fantasy From Reality -- Alternative Perspectives and Augmented Reality -- Going on the Offensive: Deceiving Video -- References -- 7 - Cyber Jihad and Deception: Virtual Enhancement and Shaping of the Terrorist Narrative -- Introduction -- Al Qaeda: Reinvigorating Cyber Jihad -- ISIS and the Cyber Jihad: Beginnings of the Digital Manifestation of the Islamic State -- ISIS and the Evolution of Sophisticated Online Propaganda -- Cyber Jihad and Digital Deception -- Summary -- References -- 8 - Asymmetric Warfare and Psyops: Nation State-Sponsored Cyber Attacks -- The Role of Nation State Versus Non-nation State Attacks -- China: Enter the Digital Dragon -- From Cyber Nationalism to Cyber Espionage -- Virtual "No-Flag" Operations: Non-nation State Cover and Concealment -- Cyberwar and the Nation State -- Future of Nation State Cyber Conflict -- Summary -- References -- 9 - Sweet Deception: Honeypots -- Introduction -- A Bit of History -- Honeypots and Honeynets -- Honeytokens -- Summary -- References -- 10 - Looking Forward: Deception in the Future -- False Online Communities -- Disruptive Technology -- Holograms -- Nanotechnology and Quantum Stealth -- Advanced Drones -- Neurohacking/Neuromarketing and Texting by Thinking -- The Man in the Middle Conundrum -- The Impact on Humans and Psychology -- References -- Index -- Back Cover.
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Burlington, MA :Syngress Publishing,
    UID:
    almahu_9948026278302882
    Format: 1 online resource (713 p.)
    Edition: 1st edition
    ISBN: 1-281-76295-4 , 9786611762957 , 0-08-056019-9
    Content: Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of ""live forensics,"" where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss ?live forensics? on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised
    Note: Includes index. , Front Cover; Malware Forensics: Investigating and Analyzing Malicious Code; Copyright Page; Dedication Page; Acknowledgements; Authors; Technical Editor; Contents; Introduction; Investigative And Forensic Methodologies; Forensic Analysis; Malware Analysis; From Malware Analysis To Malware Forensics; Chapter 1: Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System; Introduction; Building Your Live Response Toolkit; Testing and Validating your Tools; System/Host Integrity Monitoring; Volatile Data Collection Methodology; Preservation of Volatile Data , Full Memory CaptureFull Memory Acquisition on a Live Windows System; Collecting Subject System Details; System Date and Time; System Identifiers; Network Configuration; Enabled Protocols; System Uptime; System Environment; Identifying Users Logged into the System; Psloggedon; Quser (Query User Utility); Netusers; LogonSessions; Inspect Network Connections and Activity; Current and Recent Network Connections; Netstat; DNS Queries from the Host System; NetBIOS Connections; ARP Cache; Collecting Process Information; Process Name and Process Identification (PID); Temporal Context; Memory Usage , Process to Executable Program Mapping: Full System Path to Executable FileProcess to User Mapping; Child Processes; Command-line Parameters; File Handles; Dependencies Loaded by Running Processes; Exported DLLs; Capturing the Memory Contents of a Process on a Live Windows System; Correlate Open Ports with Running Processes and Programs; Openports; CurrPorts; Identifying Services and Drivers; Determining Open Files; Identifying Files Opened Locally; Identifying Files Opened Remotely; Collecting the Command History; Identifying Shares; Determining Scheduled Tasks; Collecting Clipboard Contents , Non-Volatile Data Collection from a Live Windows SystemForensic Duplication of Storage Media on a Live Windows System; Forensic Preservation of Select Data on a Live Windows System; Assess Security Configuration; Assess Trusted Host Relationships; Inspect Prefetch Files; Inspect Auto-starting Locations; Collect Event Logs; Review User Account and Group Policy Information; Examine the File System; Dumping and Parsing Registry Contents; Examine Web Browsing Activities; Incident Response Tool Suites for Windows; Windows Forensic Toolchest; ProDiscoverIR; OnlineDFS/LiveWire , Regimented Potential Incident Examination Report (RPIER)Nigilant32; Malware Discovery and Extraction From a Live Windows System; Nigilant32; Extracting Suspicious Files; Conclusions; Notes; Chapter 2: Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System; Introduction; Volatile Data Collection Methodology; Incident Response Tool Suites for Linux; Full Memory Dump on a Live UNIX System; Preserving Process Memory on a Live UNIX System; Collecting Subject System Details; Identifying Users Logged into the System; Determining Network Connections and Activity , Collecting Process Information , English
    Additional Edition: ISBN 1-59749-268-X
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9948025803502882
    Format: 1 online resource (560 pages)
    Edition: 1st edition
    ISBN: 1-280-58258-8
    Content: Malware Forensics Field Guide for Windows Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides , a series of companions for any digital and computer forensic student, investigator or analyst. Each Guide is a toolkit, with checklists for specific tasks, case studies of difficult situations, and expert analyst tips that will aid in recovering data from digital media that will be used in criminal prosecution. This book collects data from all methods of electronic data storage and transfer devices, including computers, laptops, PDAs and the images, spreadsheets and other types of files stored on these devices. It is specific for Windows-based systems, the largest running OS in the world. The authors are world-renowned leaders in investigating and analyzing malicious code. Chapters cover malware incident response - volatile data collection and examination on a live Windows system; analysis of physical and process memory dumps for malware artifacts; post-mortem forensics - discovering and extracting malware and associated artifacts from Windows systems; legal considerations; file identification and profiling initial analysis of a suspect file on a Windows system; and analysis of a suspect program. This field guide is intended for computer forensic investigators, analysts, and specialists. A condensed hand-held guide complete with on-the-job tasks and checklists Specific for Windows-based systems, the largest running OS in the world Authors are world-renowned leaders in investigating and analyzing malicious code
    Note: Includes index. , Malware incident response -- Memory forensics -- Post-mortem forensics -- Legal considerations -- File identification and profiling -- Analysis of a malware specimen.
    Additional Edition: ISBN 1-59749-472-0
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9949697487802882
    Format: 1 online resource (xxxix, 574 pages) : , illustrations.
    Edition: 1st edition
    ISBN: 1-59749-471-2 , 9786613612366
    Series Statement: Digital forensics field guides
    Content: The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a ""toolkit"" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a la
    Note: Description based upon print version of record. , Malware incident response -- Linux memory forensics -- Postmortem forensics -- Legal considerations -- File identification and profiling -- Analysis of a malware specimen. , English
    Additional Edition: ISBN 1-59749-470-4
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
  • 6
    UID:
    edoccha_9960073538202883
    Format: 1 online resource (xxxix, 574 pages) : , illustrations.
    Edition: 1st edition
    ISBN: 1-59749-471-2 , 9786613612366
    Series Statement: Digital forensics field guides
    Content: The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a ""toolkit"" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a la
    Note: Description based upon print version of record. , Malware incident response -- Linux memory forensics -- Postmortem forensics -- Legal considerations -- File identification and profiling -- Analysis of a malware specimen. , English
    Additional Edition: ISBN 1-59749-470-4
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    gbv_776161261
    Format: XXXIX, 574 S. , Ill., graph. Darst.
    ISBN: 9781597494700
    Series Statement: Digital forensics field guides
    Content: Malware incident response -- Linux memory forensics -- Postmortem forensics -- Legal considerations -- File identification and profiling -- Analysis of a malware specimen
    Note: Includes bibliographical references and index , Malware incident responseLinux memory forensics -- Postmortem forensics -- Legal considerations -- File identification and profiling -- Analysis of a malware specimen.
    Additional Edition: ISBN 9781597494717
    Language: English
    Subjects: Computer Science , Law
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Computerforensik ; LINUX
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    edocfu_9960073538202883
    Format: 1 online resource (xxxix, 574 pages) : , illustrations.
    Edition: 1st edition
    ISBN: 1-59749-471-2 , 9786613612366
    Series Statement: Digital forensics field guides
    Content: The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a ""toolkit"" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a la
    Note: Description based upon print version of record. , Malware incident response -- Linux memory forensics -- Postmortem forensics -- Legal considerations -- File identification and profiling -- Analysis of a malware specimen. , English
    Additional Edition: ISBN 1-59749-470-4
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    edoccha_9960161219102883
    Format: 1 online resource (286 pages)
    ISBN: 0-12-411639-6 , 0-12-411630-2
    Note: Front Cover -- Deception in the Digital Age -- Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications -- Copyright -- Dedication -- Contents -- About the Authors -- Acknowledgments -- Introduction: Cyberanthropology of Deception -- The Digital Evolution: Cyberanthropology of Deception -- How to Use This Book -- References -- 1 - The Psychology of Deception -- Misdirection and the Psychological Principles Behind Effective Magic -- Active and Passive Misdirection: Factors Toward Influence by Suggestion -- General, Particular, and Post Misdirection -- Misdirection Through Disguise and Attention Control -- Physical and Psychological Misdirection -- Exploiting False Assumptions: Assumptive, One-Point, and Two-Point Misdirection -- Misdirection Through Message Construction and Conveyance: Attitude, Transference, Repetition, Verbal/Nonverbal -- Misdirection Through Distraction, Diversion, or Relaxation -- Degrees of Misdirection -- Magician's Weapons of Deception -- Direct Forcing -- Indirect Forcing -- Magic, Illusion, and the Prevalence of Deception -- Neuropsychology of Magic and Deception -- Early Attempts at Explaining Digital Deception -- Traditional Deception Research via Verbal and Nonverbal Cues -- Deception Detection Through the Analysis of Words and Images -- Deception Through the Practice of Social Engineering -- The Psychology of Deception -- Summary -- References -- 2 - Virtual Myths: Internet Urban Legend, Chain Letters, and Warnings -- Urban Myths and Legends -- Elements of Urban Legends -- Urban Myths Online -- Traditional Chain Letters -- Hoax Messages -- Scare Chains -- Threat Chains -- Weaponizing Online Urban Legends, Hoaxes, and Chain Communications -- Defending Against Online Urban Legends, Chains, and Hoax Communications -- Element Analysis. , Open Source Intelligence Analysis -- References -- 3 - Viral Influence: Deceptive Computing Attacks Through Persuasion -- Psychological Principles of Influence -- Factors, Sequence, and Timing of Persuasive Communications -- Dual Process Models -- The Yale Information Processing Model -- The Objectives of Persuasive Communications -- Social Influence and Persuasion in Computer-Mediated Communications -- Social Influence Over Computer-Mediated Communications and Digital Platforms -- Adapting Traditional Social Cues Communicator Salience -- Persuasive Technology -- Deceptive Computing Attacks Through Persuasion -- Hoax Virus Communications -- Principles of Persuasion in Hoax Virus Narratives -- Scareware -- Principles of Persuasion in Scareware Attack "Storyboards" -- Tech Support Scams -- Principles of Persuasion in Tech Support Scam "Storyboards" -- Ransomware -- Principles of Persuasion in Ransomware Attacks -- The Future of Viral Influence -- Conclusion -- References -- 4 - Social Dynamics of Deception: Cyber Underground Markets and Cultures -- Social Dynamics in Computer-Mediated Communications -- The Process of Buying and Selling -- Trust Inducing Mechanisms -- Subcultural Norms and the Role of Trust -- No Honor Among Cyber Thieves: Deception Within Underground Markets -- Virtual False Flags -- Sock Puppets -- Persuasive Technology -- Impersonation -- Attacking Trust Within Underground Markets -- References -- 5 - Phishing, Watering Holes, and Scareware -- Phishing -- Watering Hole Attacks (Strategic Web Compromises) -- The Watering Hole Attack Deception Chain -- Passive Misdirection -- Technical Persuasion -- Scareware -- Ransomware -- Social Engineering -- References -- 6 - Seeing is Not Believing: Deceptive Internet Video Communications -- A Bit of History -- One of Photography's Early Deceptions -- Film Fakes -- Video Software and Tools. , Deciphering Fantasy From Reality -- Alternative Perspectives and Augmented Reality -- Going on the Offensive: Deceiving Video -- References -- 7 - Cyber Jihad and Deception: Virtual Enhancement and Shaping of the Terrorist Narrative -- Introduction -- Al Qaeda: Reinvigorating Cyber Jihad -- ISIS and the Cyber Jihad: Beginnings of the Digital Manifestation of the Islamic State -- ISIS and the Evolution of Sophisticated Online Propaganda -- Cyber Jihad and Digital Deception -- Summary -- References -- 8 - Asymmetric Warfare and Psyops: Nation State-Sponsored Cyber Attacks -- The Role of Nation State Versus Non-nation State Attacks -- China: Enter the Digital Dragon -- From Cyber Nationalism to Cyber Espionage -- Virtual "No-Flag" Operations: Non-nation State Cover and Concealment -- Cyberwar and the Nation State -- Future of Nation State Cyber Conflict -- Summary -- References -- 9 - Sweet Deception: Honeypots -- Introduction -- A Bit of History -- Honeypots and Honeynets -- Honeytokens -- Summary -- References -- 10 - Looking Forward: Deception in the Future -- False Online Communities -- Disruptive Technology -- Holograms -- Nanotechnology and Quantum Stealth -- Advanced Drones -- Neurohacking/Neuromarketing and Texting by Thinking -- The Man in the Middle Conundrum -- The Impact on Humans and Psychology -- References -- Index -- Back Cover.
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    edocfu_9960161219102883
    Format: 1 online resource (286 pages)
    ISBN: 0-12-411639-6 , 0-12-411630-2
    Note: Front Cover -- Deception in the Digital Age -- Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications -- Copyright -- Dedication -- Contents -- About the Authors -- Acknowledgments -- Introduction: Cyberanthropology of Deception -- The Digital Evolution: Cyberanthropology of Deception -- How to Use This Book -- References -- 1 - The Psychology of Deception -- Misdirection and the Psychological Principles Behind Effective Magic -- Active and Passive Misdirection: Factors Toward Influence by Suggestion -- General, Particular, and Post Misdirection -- Misdirection Through Disguise and Attention Control -- Physical and Psychological Misdirection -- Exploiting False Assumptions: Assumptive, One-Point, and Two-Point Misdirection -- Misdirection Through Message Construction and Conveyance: Attitude, Transference, Repetition, Verbal/Nonverbal -- Misdirection Through Distraction, Diversion, or Relaxation -- Degrees of Misdirection -- Magician's Weapons of Deception -- Direct Forcing -- Indirect Forcing -- Magic, Illusion, and the Prevalence of Deception -- Neuropsychology of Magic and Deception -- Early Attempts at Explaining Digital Deception -- Traditional Deception Research via Verbal and Nonverbal Cues -- Deception Detection Through the Analysis of Words and Images -- Deception Through the Practice of Social Engineering -- The Psychology of Deception -- Summary -- References -- 2 - Virtual Myths: Internet Urban Legend, Chain Letters, and Warnings -- Urban Myths and Legends -- Elements of Urban Legends -- Urban Myths Online -- Traditional Chain Letters -- Hoax Messages -- Scare Chains -- Threat Chains -- Weaponizing Online Urban Legends, Hoaxes, and Chain Communications -- Defending Against Online Urban Legends, Chains, and Hoax Communications -- Element Analysis. , Open Source Intelligence Analysis -- References -- 3 - Viral Influence: Deceptive Computing Attacks Through Persuasion -- Psychological Principles of Influence -- Factors, Sequence, and Timing of Persuasive Communications -- Dual Process Models -- The Yale Information Processing Model -- The Objectives of Persuasive Communications -- Social Influence and Persuasion in Computer-Mediated Communications -- Social Influence Over Computer-Mediated Communications and Digital Platforms -- Adapting Traditional Social Cues Communicator Salience -- Persuasive Technology -- Deceptive Computing Attacks Through Persuasion -- Hoax Virus Communications -- Principles of Persuasion in Hoax Virus Narratives -- Scareware -- Principles of Persuasion in Scareware Attack "Storyboards" -- Tech Support Scams -- Principles of Persuasion in Tech Support Scam "Storyboards" -- Ransomware -- Principles of Persuasion in Ransomware Attacks -- The Future of Viral Influence -- Conclusion -- References -- 4 - Social Dynamics of Deception: Cyber Underground Markets and Cultures -- Social Dynamics in Computer-Mediated Communications -- The Process of Buying and Selling -- Trust Inducing Mechanisms -- Subcultural Norms and the Role of Trust -- No Honor Among Cyber Thieves: Deception Within Underground Markets -- Virtual False Flags -- Sock Puppets -- Persuasive Technology -- Impersonation -- Attacking Trust Within Underground Markets -- References -- 5 - Phishing, Watering Holes, and Scareware -- Phishing -- Watering Hole Attacks (Strategic Web Compromises) -- The Watering Hole Attack Deception Chain -- Passive Misdirection -- Technical Persuasion -- Scareware -- Ransomware -- Social Engineering -- References -- 6 - Seeing is Not Believing: Deceptive Internet Video Communications -- A Bit of History -- One of Photography's Early Deceptions -- Film Fakes -- Video Software and Tools. , Deciphering Fantasy From Reality -- Alternative Perspectives and Augmented Reality -- Going on the Offensive: Deceiving Video -- References -- 7 - Cyber Jihad and Deception: Virtual Enhancement and Shaping of the Terrorist Narrative -- Introduction -- Al Qaeda: Reinvigorating Cyber Jihad -- ISIS and the Cyber Jihad: Beginnings of the Digital Manifestation of the Islamic State -- ISIS and the Evolution of Sophisticated Online Propaganda -- Cyber Jihad and Digital Deception -- Summary -- References -- 8 - Asymmetric Warfare and Psyops: Nation State-Sponsored Cyber Attacks -- The Role of Nation State Versus Non-nation State Attacks -- China: Enter the Digital Dragon -- From Cyber Nationalism to Cyber Espionage -- Virtual "No-Flag" Operations: Non-nation State Cover and Concealment -- Cyberwar and the Nation State -- Future of Nation State Cyber Conflict -- Summary -- References -- 9 - Sweet Deception: Honeypots -- Introduction -- A Bit of History -- Honeypots and Honeynets -- Honeytokens -- Summary -- References -- 10 - Looking Forward: Deception in the Future -- False Online Communities -- Disruptive Technology -- Holograms -- Nanotechnology and Quantum Stealth -- Advanced Drones -- Neurohacking/Neuromarketing and Texting by Thinking -- The Man in the Middle Conundrum -- The Impact on Humans and Psychology -- References -- Index -- Back Cover.
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages