Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been mou
At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhap
Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the maj
This book presents refereed proceedings of the Second International Conference on Advances in Cyber Security, ACeS 2020, held in Penang, Malaysia, in September
Voice over Internet Protocol (VoIP) networks, the technology used to place phone calls through the Internet, suffer from the same security holes as standard IP