Showing 1 - 20 results of 341 for search '"Phish"', query time: 0.14s Refine Results
  1. 1

    Phish the biography / by Puterbaugh, Parke

    [Cambridge, Mass.] : Da Capo Press, 2009
    1st Da Capo Press ed.
    Table of Contents: “…Overview : a tale of two cities (and two farms) -- Getting their feet wet : 1983-1987 -- Phish's lost masterpiece : the legend of Gamehendge -- Growth spurt : 1988-1992 -- Peak years : 1993-1996 -- Growing pains : 1997-2000 -- Hiatus, resumption, breakup : 2001-2007 -- Reunion : 2008-2009.…”
    Format: Electronic eBook
    Access E-Book
  2. 2

    Phish : the biography / by Puterbaugh, Parke

    [Cambridge, Mass.] : Da Capo Press, 2009
    1st Da Capo Press ed.
    Table of Contents: “…Overview : a tale of two cities (and two farms) -- Getting their feet wet : 1983-1987 -- Phish's lost masterpiece : the legend of Gamehendge -- Growth spurt : 1988-1992 -- Peak years : 1993-1996 -- Growing pains : 1997-2000 -- Hiatus, resumption, breakup : 2001-2007 -- Reunion : 2008-2009.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  3. 3

    FIGHTING PHISHING deploying defense-in-depth to defeat hackers and malware. by GRIMES, ROGER A.

    [S.l.] : JOHN WILEY, 2024
    Subjects: “…Phishing Prevention.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  4. 4

    Phishing for phools : the economics of manipulation and deception / by Akerlof, George A., 1940-, Shiller, Robert J.

    Princeton : Princeton University Press, 2015
    Table of Contents: “…Expect to be manipulated: phishing equilibrium -- Part one: Unpaid bills and financial crash -- 1. …”
    Format: Book


  5. 5

    Phishing exposed / by James, Lance

    Rockland, MA : Syngress, 2005
    Table of Contents: “…Banking on phishing -- Go Phish!-- E-mail: the weapon of mass delivery -- Crossing the phishing line -- The dark side of the web -- Malware, money savers, and ma bell mayhem! …”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
    Full text (Wentworth users only)
  6. 6

    Phishing and countermeasures : understanding the increasing problem of electronic identity theft /

    Hoboken, N.J. : Wiley-Interscience, 2007
    Table of Contents: “…Introduction to phishing --…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  7. 7

    Fighting phishing : everything you can do to fight social engineering and phishing / by Grimes, Roger A., Just, John N.

    [Place of publication not identified] : Ascent Audio, 2024
    [First edition].
    Subjects: “…Phishing Prevention.…”
    Format: Electronic Audio
    Streaming audio (Wentworth users only)
  8. 8

    Phishing exposed by James, Lance

    Rockland, Mass. : Syngress Pub., 2005
    Subjects: “…Phishing.…”
    Format: Electronic eBook
    Access E-Book
    Access E-Book.
  9. 9

    Phishing and Communication Channels A Guide to Identifying and Mitigating Phishing Attacks / by Sonowal, Gunikhan

    Berkeley, CA : Apress : Imprint: Apress, 2022
    1st ed. 2022.
    Table of Contents: “…1: Introduction to Phishing -- 2: Types of Phishing -- 3: Communication Channels -- 4: What Does a Phishing URL Look Like? …”
    Format: Electronic eBook
    Full text (Wentworth users only)
  10. 10

    The kind Phish phans / by Walker, Marcus Aaron

    [Place of publication not identified] : [publisher not identified], 1999
    Subjects: “…Phish (Musical group) n 96049486…”
    Format: Thesis Book

    This item is not available through FLO. Please contact your home library for further assistance.
  11. 11

    Phishing dark waters : the offensive and defensive sides of malicious emails / by Hadnagy, Christopher, Fincher, Michele

    Indianapolis, IN : Wiley, 2015
    Table of Contents: “…An Introduction to the Wild World of Phishing -- The Psychological Principles of Decision-Making -- Influence and Manipulation -- Lessons in Protection -- Plan Your Phishing Trip: Creating the Enterprise Phishing Program -- The Good, the Bad, and the Ugly: Policies and More -- The Professional Phisher's Tackle Bag -- Phish Like a Boss.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
    Full text (Wentworth users only)
  12. 12

    Phishing dark waters : the offensive and defensive sides of malicious e-mails / by Hadnagy, Christopher, Fincher, Michele

    Indianapolis, Indiana : Wiley, 2015
    Subjects: “…Phishing.…”
    Format: Electronic eBook
    Access E-Book
  13. 13

    How to Catch a Phish A Practical Guide to Detecting Phishing Emails / by Oles, Nicholas

    Berkeley, CA : Apress : Imprint: Apress, 2023
    1st ed. 2023.
    Table of Contents: “…How Email Works -- Chapter 2. Phishing Tactics and Techniques -- Chapter 3. PICERL Process explained -- Chapter 4. …”
    Format: Electronic eBook
    Full text (Wentworth users only)
  14. 14

    How to catch a phish : a practical guide to detecting phishing emails / by Oles, Nicholas

    New York : Apress, 2023
    Table of Contents: “…How Email Works -- Chapter 2. Phishing Tactics and Techniques -- Chapter 3. PICERL Process explained -- Chapter 4. …”
    Format: Electronic eBook
    Full text (Wentworth users only)
  15. 15

    OWASP Forgery and Phishing / by Training, Integrity

    Stone River eLearning, 2019
    1st edition.
    Format: Electronic Video
    Streaming video (Wentworth users only)
  16. 16

    A machine-learning approach to phishing detection and defense / by Akanbi, Oluwatobi Ayodeji, Amiri, Iraj Sadegh, 1977-, Fazeldehkordi, Elahe

    Amsterdam : Elsevier, 2014
    Subjects: “…Phishing. sh2005003206…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  17. 17

    Phishing detection using content based image classification / by Khandelwal, Shekhar, Das, Rik, 1978-

    Boca Raton : Chapman & Hall/CRC Press, 2022
    First edition.
    Table of Contents: “…Phishing and cybersecurity -- Image processing based phishing detection techniques -- Implementing CNN for classifying phishing websites -- Transfer learning approach in phishing detection -- Feature extraction and representation learning -- Dimensionality reduction techniques -- Feature fusion techniques -- Comparison of phishing detection approaches -- Basics of digital image processing.…”
    Format: Electronic eBook
    Full text (WIT users only)
  18. 18

    How Google identified 12.4 million potential victims of phishing by Mueller, Neal

    O'Reilly Media, Inc., 2019
    1st edition.
    Format: Electronic Video
    Streaming video (Wentworth users only)
  19. 19

    How Google identified 12.4 million potential victims of phishing by Mueller, Neal

    [Place of publication not identified] : O'Reilly Media, Inc., 2019
    Format: Electronic eBook
    Full text (Wentworth users only)
  20. 20

    Spam nation : the inside story of organized cybercrime--from global epidemic to your front door by Krebs, Brian

    Naperville, Illinois : Sourcebooks, 2014
    Subjects:
    Format: Book