MARC details
| 000 -LEADER |
| fixed length control field |
02415nam a22003017a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
EG-NcFUE |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20260212141628.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
251112s2025 ua|a|||| |||| 00| 0deng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781032822686 |
| 040 ## - CATALOGING SOURCE |
| Language of cataloging |
eng |
| 043 ## - GEOGRAPHIC AREA CODE |
| Geographic area code |
ua |
| 082 #4 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Edition number |
23 |
| Classification number |
005.8 |
| Item number |
DRG |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Das, Ravindra. |
| 9 (RLIN) |
34363 |
| 245 1# - TITLE STATEMENT |
| Title |
Generative AI: |
| Remainder of title |
Phishing and Cybersecurity Metrics/ |
| Statement of responsibility, etc |
Ravindra Das. |
| 250 ## - EDITION STATEMENT |
| Edition statement |
1st edition. |
| 264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
Boca Raton: |
| Name of publisher, distributor, etc |
CRC Press, |
| Date of publication, distribution, etc |
©2025. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xv, 280 p. : |
| Other physical details |
illustrations ; |
| Dimensions |
24 cm. |
| 336 ## - CONTENT TYPE |
| Source |
rdacontent |
| Content type term |
text |
| 337 ## - MEDIA TYPE |
| Source |
rdamedia |
| Media type term |
unmediated |
| 338 ## - CARRIER TYPE |
| Source |
rdacarrier |
| Carrier type term |
volume |
| 500 ## - GENERAL NOTE |
| General note |
The cybersecurity landscape is changing, for sure. For example, one of the oldest threat variants is that of phishing. It evolved in the early 1990s, but even today it is still being used as a primary threat variant and has now become much more sophisticated, covert, and stealthy in nature. For example, it can be used to launch ransomware, social engineering, and extortion attacks.<br/><br/>The advent of Generative AI is making this much worse. For example, a cyberattacker can now use something like ChatGPT to craft the content for phishing emails that are so convincing that it is almost impossible to tell the difference between what is real and what is fake. This is also clearly evident in the use of deepfakes, where fake images of real people are replicated to create videos to lure unsuspecting victims to a fake website.<br/><br/>But Generative AI can also be used for the good to combat Phishing Attacks. This is the topic of this book. In this, we cover the following:<br/><br/>A review of phishing<br/>A review of AI, Neural Networks, and Machine Learning<br/>A review of Natural Language Processing, Generative AI, and the Digital Person<br/>A proposed solution as to how Generative AI can combat phishing attacks as they relate to Privileged Access accounts |
| 505 ## - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Acknowledgements. Chapter 1 Introduction to Phishing. Chapter 2 Overview of Artificial Intelligence, Neural Networks, and Machine Learning. Chapter 3 Introduction to Generative AI, Natural Language Processing, and the Digital Person. Chapter 4 Review of Cybersecurity Metrics. Chapter 5 Conclusions. Index. |
| 650 17 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Database security. |
| Source of heading or term |
qarmk. |
| 9 (RLIN) |
25959 |
| 650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Artificial intelligence. |
| 9 (RLIN) |
33122 |
| 650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| 9 (RLIN) |
13076 |
| 650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Security measures |
| 9 (RLIN) |
34364 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Koha item type |
Books |