THE LANGUAGE OF CYBER ATTACKS : (Record no. 202900)

MARC details
000 -LEADER
fixed length control field 02207nam a2200349 i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20260129121120.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 260128t20242024nyu gr 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781350354678
Terms of availability RM122.40
Qualifying information paperback
040 ## - CATALOGING SOURCE
Original cataloging agency PPAK
Language of cataloging eng
Transcribing agency PPAK
Description conventions rda
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23
Classification number 005.8
090 00 - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR) 005.8
Feature heading MAU
Feature heading G
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Mauro, Aaron,
Relator term author.
245 14 - TITLE STATEMENT
Title THE LANGUAGE OF CYBER ATTACKS :
Remainder of title A Rhetoric of Deception /
Statement of responsibility, etc. AARON MAURO ; Series Editors: Anthony Mandal and Jenny Kidd
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture London, New York :
Name of producer, publisher, distributor, manufacturer BLOOMSBURY ACADEMIC,
Date of production, publication, distribution, manufacture, or copyright notice 2024
Date of production, publication, distribution, manufacture, or copyright notice ©2024
300 ## - PHYSICAL DESCRIPTION
Extent x, 224 pages ;
Dimensions 22 cm
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement BLOOMSBURY STUDIES IN DIGITAL CULTURES ;
Volume/sequential designation 6
500 ## - GENERAL NOTE
General note Includes index
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Bibliography: pages 215-219.
520 ## - SUMMARY, ETC.
Summary, etc. Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain sensitive information or compromise a computer system. The perils of clicking an unknown link or divulging sensitive information via email are well-known, so why do we continue to fall prey to these malicious messages? This groundbreaking book examines the rhetoric of deception through the lure, asking where its all-too-human allure comes from and suggesting ways in which we can protect ourselves online. Examining practices and tools such as phishing, ransomware and clickbait, this book uses case studies of notorious cyberattacks by both cyber criminals and nation-states on organizations such Facebook, Google, and the US Department of Defence, and in-depth, computational analyses of the messages themselves to unpack the rhetoric of cyberattacks. In doing so, it helps us to understand the small but crucial moments of indecision that pervade one of the most common forms of written communication.
650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
Topical term or geographic name entry element Computer security
Topical term or geographic name entry element Online manipulation
Topical term or geographic name entry element Rhetoric and psychology
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Mandal, Anthony,
Relator term editor.
Personal name Kidd, Jenny,
Relator term editor.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Bloomsbury studies in digital cultures ;
Volume/sequential designation 6
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book

No items available.