LEADER 03352nim a22005417i 4500001 17144090 005 20240429162348.0 006 m o h 007 sz zunnnnnuneu 007 cr nnannnuuuuu 008 240401s2024 xx nnnn o z n eng d 035 (OCoLC)on1428352682 040 ORMDA |beng |erda |epn |cORMDA |dOCLCO 020 9781663734990 |q(electronic audio bk.) 020 1663734992 |q(electronic audio bk.) 037 9781663734990 |bO'Reilly Media 050 4 HV6773.15.P45 100 1 Grimes, Roger A., |eauthor. |0http://id.loc.gov/authorities/names/n2001000539 245 10 Fighting phishing : |beverything you can do to fight social engineering and phishing / |cRoger A. Grimes with Dr. John N. Just. 250 [First edition]. 264 1 [Place of publication not identified] : |bAscent Audio, |c2024. 300 1 online resource (1 sound file (11 hr., 43 min.)) 306 114300 336 spoken word |bspw |2rdacontent 337 computer |bc |2rdamedia 338 online resource |bcr |2rdacarrier 344 digital |2rdatr 347 audio file |2rdaft 506 Access restricted by licensing agreement. 511 0 Read by Ray Greenley. 520 Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing serves as the ideal defense against phishing. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. - Learn what social engineering and phishing are, why they are so dangerous to your cybersecurity, and how to defend against them - Educate yourself and other users on how to identify and avoid phishing scams, to stop attacks before they begin - Discover the latest tools and strategies for locking down data when phishing has taken place, and stop breaches from spreading - Develop technology and security policies that protect your organization against the most common types of social engineering and phishing. 588 Online resource; title from title details screen (O'Reilly, viewed April 1, 2024). 590 Access is available to the Yale community. 650 0 Phishing |xPrevention. 650 0 Computer security. |0http://id.loc.gov/authorities/subjects/sh90001862 650 0 Electronic mail messages |xSecurity measures. 655 7 Audiobooks. |2lcgft |0http://id.loc.gov/authorities/genreForms/gf2011026063 700 1 Greenley, Ray, |enarrator. 700 1 Just, John N., |eauthor. 730 0 O'Reilly Safari. |gOCLC KB. 852 80 |byulint |hNone |zOnline resource 852 80 |zOnline resource 856 40 |yStreaming audio |uhttps://go.oreilly.com/yale-university/library/view/-/9781663734990/?ar 901 HV6773.15.P45 902 Yale Internet Resource |bYale Internet Resource >> None|DELIM|17020852 905 online resource 907 2024-04-29T16:23:48.000Z 946 DO NOT EDIT. DO NOT EXPORT.