Buy Used
$9.95
Condition: Used: Acceptable
Comment: Former library book with the usual stickers and markings. Moderate wear on the cover. Pages are clean and the binding is tight. Stored and shipped by Amazon.
Access codes and supplements are not guaranteed with used items.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Phishing: Cutting the Identity Theft Line Paperback – May 6, 2005

ISBN-13: 978-0764584985 ISBN-10: 0764584987 Edition: 1st

Used
Price: $9.95
17 New from $9.45 19 Used from $0.01
Amazon Price New from Used from
Paperback
"Please retry"
$9.45 $0.01
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Hero Quick Promo
Save up to 90% on Textbooks
Rent textbooks, buy textbooks, or get up to 80% back when you sell us your books. Shop Now

Editorial Reviews

Review

“…written by a phishing security expert at a top financial institution, this unique book helps IT professionals respond to phishing incidents…” (Computing, 28 July 2005)

From the Back Cover

Have you been caught yet?

They don't just want to know who you are, they want to BE who you are. By duplicating a legitimate website, phishers can convince you that email asking for your personal information came from your bank, an online retailer, even your ISP. Their high-tech identity theft costs American consumers and businesses billions, and if you access the Internet, you're a target. Whether you manage corporate security or just shop online, this book is loaded with weapons you can't afford to be without.

  • Be able to identify and avoid phishing emails and websites
  • Recognize spyware, understand how it benefits phishers, and learn how to get rid of it
  • Take appropriate steps to safeguard your organization against attack
  • Learn how to protect yourself online
  • Find out how to report phishing incidents, and why you should
  • Understand the scope of phishing and how it threatens our online infrastructure
  • Explore additional resources that will keep you up to date
  • Discover how to get off the hook if you've already swallowed the bait
NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 334 pages
  • Publisher: Wiley; 1 edition (May 6, 2005)
  • Language: English
  • ISBN-10: 0764584987
  • ISBN-13: 978-0764584985
  • Product Dimensions: 7.3 x 0.8 x 9.2 inches
  • Shipping Weight: 1 pounds
  • Average Customer Review: 4.3 out of 5 stars  See all reviews (11 customer reviews)
  • Amazon Best Sellers Rank: #2,431,840 in Books (See Top 100 in Books)

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.3 out of 5 stars
Share your thoughts with other customers

Most Helpful Customer Reviews

9 of 11 people found the following review helpful By Thomas Duff HALL OF FAMETOP 1000 REVIEWERVINE VOICE on May 14, 2005
Format: Paperback
Phishing is the scourge of the internet right now. Rachael Lininger and Russell Dean Vines have done a pretty good job in helping individuals and companies understand the problem with their book Phishing - Cutting The Identity Theft Line (Wiley).

Chapter List: Phishing for Phun and Profit; Bait and Switch: Phishing Emails; False Fronts: Phishing Websites; Are You Owned: Understanding Phishing Spyware; Gloom and Doom: You Can't Stop Phishing Completely; Helping Your Organization Avoid Phishing; Fighting Back: How Your Organization Can Respond To Attack; Avoiding the Hook: Consumer Education; Help! I'm a Phish! Consumer Response; Glossary of Phishing-Related Terms; Useful Websites; Identity Theft Affidavit; Index

It used to be I'd see one or two "requests" a week to update my personal information for places like eBay or Citibank. Now it's closer to two or three a day. I'm well aware that these phishing attempts are scams meant to commit identity theft, but apparently we internet-savvy people are in the minority. Lininger and Vines have written a very readable and understandable guide to phishing that can easily be given to nearly anyone to help them protect themselves. The uninitiated will quickly grasp the idea that they shouldn't be responding to emails like these, and as a result they'll be much safer. People who are internet-savvy will learn the tricks that are used by the phishers to make links appear to be something other than what they truly are. Even organizations can benefit from the chapters on what they should do if they find that their servers have been co-opted to run a phishing scam.

Very practical material with the benefit of being a book that's fun to read. This is information that needs to be in the hands of all internet users these days...
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 6 people found the following review helpful By Marnie_ATL on May 13, 2005
Format: Paperback
I was browsing through computer security oriented books recently (May 2005) at a large national book chain. I went through the indexes in the back of the books to see how often or not the category "Phishing" was referenced. It was very few.

I then stumbled across this book. It is very informative to those who are only vaguely familiar with this big scam. The authors even provide sample text and code that phishers have regularly used. As noted in the book, in the earlier days, the phishers often used poorly constructed English in their spam, but the scam has grown in its own sophistication. The authors provide also very clear terminology in regards to this scam, such as the difference between the terms: phish, vs. phishing vs. phishing sites vs. phishing email. They also provide help to those who have fallen for the phishing scams. The authors give the reader step by step instructions on how to go to the police to file a report and to report the issue to the ISP.

The authors are very correct, this problem of phishing is only going to grow larger as a problem online despite making more people aware of it and the unknown backend battle against it by the ISPs. Luckily magazines like Readers' Digest and Newsweek have had occasional articles on phishing. I can only hope spreading more of such awareness minimizes more attacks against unsuspecting users online who are defrauded.

I work in a field where I attempt to minimize phishing scams. I found that such attacks have seemed to increase over the past year. A good starter site for such information is: <a href="[...]">antiphishing.org</a> the Anti-Phishing Working Group's website.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 1 people found the following review helpful By thecrwth on March 26, 2006
Format: Paperback
The authors claim this book is for a wide range of people from network administrators type people to any one who wants to learn about phishing. Though there is a lot of information in this book, most of it will be common knowledge to people who are employed to keeps networks secure. This books would be great for some one who has been scammed, if you can overlook the flakey writing. For instance, instead of Congressmen they refer to them as "Congresscritters". It was annoying and difficult to keep much of the authors' information seriously. If you can ignore this, you will learn a lot about phishing scams, what to avoid, and how to recover from one.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback Verified Purchase
I purchased this book to research the subject of phishing and identity theft for a web project. I was not disappointed with the results, although you have to want this level of detail. For example, the book gives a thorough treatment of the technologies involved and how they work in unison to 'scam' you, driven of course by the anonymous perpetrators. If you dig deep enough and land on the right pages, you will find answers for questions like, "well how do I avoid that?", or "so what can I do to fix this?" I think the authors have thought about what the reader will feel, want and need.

The authors have identified the key readership as "Incident Response Teams", "Information Security Professionals", "Executive Management", and "Everyone who uses the Internet". The technical detail and complexity is great for the first three categories of readership, but stating the book should be read by "everyone who uses the Internet" is, well, stretching it because that is virtually everyone on the planet with an Internet connection. People who go to [...], for example, will have a lot of difficulty following the book and knowing which bits are both relevant and simple enough to put into their daily lives. However, most people understand how a book is presented so long as they follow the Contents page and use it prescriptively; even the technically challenged will get something from it.

One last thing. I like the fact the authors have backed up what they talk about with references and follow on information. For example, when they talk about identity theft and how it impacts everyday people like you and me, they also provide details about what to do and where to go for help.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Recent Customer Reviews


What Other Items Do Customers Buy After Viewing This Item?