Overview: Examines a broad range of cyberdeception techniques including impersonation, delays, fakes, camouflage, false excuses, and social engineering.Provides more breadth of coverage than any competing book.This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming detail
|