Search:

Phish : the biography / by Puterbaugh, Parke.(CARDINAL)319797;
Overview : a tale of two cities (and two farms) -- Getting their feet wet : 1983-1987 -- Phish's lost masterpiece : the legend of Gamehendge -- Growth spurt : 1988-1992 -- Peak years : 1993-1996 -- Growing pains : 1997-2000 -- Hiatus, resumption, breakup : 2001-2007 -- Reunion : 2008-2009.
Subjects: Biographies.; Phish (Musical group); Rock musicians;
Available copies: 1 / Total copies: 1
unAPI

Phishing : cutting the identity theft line / by Lininger, Rachael,1976-(CARDINAL)472223; Vines, Russell Dean,1952-(CARDINAL)661647;
Phishing for phun and profit -- Bait and switch : phishing emails -- False fronts : phishing websites -- Are you owned : phishing spyware -- Gloom and doom : you can't stop phishing completely -- Helping your organization avoid phishing -- Fighting back : how your organization can respond to attacks -- Avoiding the hook : consumer education -- Help! I'm a phish : consumer response.
Subjects: Phishing.;
Available copies: 1 / Total copies: 1
unAPI

Phishing exposed / by James, Lance,1978-(CARDINAL)556234; Stewart, Walter Joseph.(CARDINAL)525177;
Banking on phishing -- Go Phish!-- E-mail: the weapon of mass delivery -- Crossing the phishing line -- The dark side of the web -- Malware, money savers, and ma bell mayhem! -- So long, and thanks for all the phish!
Subjects: Phishing.;
Available copies: 1 / Total copies: 1
On-line resources: Suggest title for digitization;
unAPI

The Phish book / by Gehr, Richard,1954-(CARDINAL)650833; Phish (Musical group)(CARDINAL)636219;
Subjects: Biographies.; Phish (Musical group); Rock musicians;
Available copies: 2 / Total copies: 2
unAPI

Fighting phishing : everything you can do to fight social engineering and phishing / by Grimes, Roger A.,author.; Just, John N.,author.;
Includes bibliographical references and index."Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to individuals. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture"--
Subjects: Computer security.; Electronic mail messages; Phishing;
Available copies: 1 / Total copies: 1
unAPI

Phishing for phools : the economics of manipulation and deception / by Akerlof, George A.,1940-author.(CARDINAL)728454; Shiller, Robert J.,author.(CARDINAL)275226;
Includes bibliographical references (pages 233-256) and index.
Subjects: Economics; Free enterprise;
Available copies: 2 / Total copies: 2
unAPI

Live Phish downloads. [sound recording]. by Phish (Musical group)(CARDINAL)636219;
Set 1. NICU (6:35) ; Golgi apparatus (4:43) ; Crossroads (5:07) ; Cars trucks buses (5:30) ; Train song (3:00) ; Theme from the bottom (12:30) ; Fluffhead (16:28) ; Dirt (4:10) ; Run like an antelope (16:21) -- Set 2. Down with disease (23:35) ; David Bowie (19:48) ; Possum/I can't turn you loose (10:35) ; Tube (10:49) ; You enjoy myself (19:32) ; Good times bad times (7:31) ; Filler : 12/19/97 soundcheck ; Funky bitch (5:49) ; New York soundcheck jam (8:10).Phish (Trey Anastasio, Jon Fishman, Mike Gordon, Page McConnell).Recorded live at Madison Square Garden, New York, NY, Dec. 29, 1997.
Subjects: Live sound recordings.; Rock music;
Available copies: 1 / Total copies: 1
unAPI

Swiped : how to protect yourself in a world full of scammers, phishers, and identity thieves / by Levin, Adam(Adam K.),author.(CARDINAL)623108; Friedlander, Beau,author.(CARDINAL)537347;
part 1. An overview of the problem: What's in a name (and a number)? ; A short history of identity (and fraud) : (and you thought it was just about credit cards) ; Swiping happens -- part 2. The basics of what you can do: Understanding the problem is the solution ; The three Ms -- part 3. The many types of identity theft: Spies in your home : how the Internet of things may violate your privacy, threaten your security, and ruin your credit ; A taxing situation ; It's a hard-knock life : child identity theft ; May the farce be with you : social media dos and don'ts ; From dangerous to deadly : on healthcare scams and medical identity theft ; Wanted dead of alive : (but it's easier if you're dead) ; Culture eats strategy : business considerations ; The three Ms for companies : you must build it because they will come ; The highest law -- part 4. Resources and terms: appendix 1. Fraud stories ; appendix 2. A glossary of scams ; appendix 3. Identity theft and the deceased : prevention and victim tips ; appendix 4. Request a credit report for the deceased ; appendix 5. Deceased affidavit of fact.Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam folders, and those are good ideas as far as they go. But the truth is, there are people out there--a lot of them--who treat stealing your identity as a full-time job ... Adam Levin, a longtime consumer advocate and identity fraud expert, is your guide to this brave new world. By telling [pertinent] stories and extracting the relevant lessons, he offers a strategy for dealing with these risks.
Subjects: Identity theft; Identity theft.; Phishing; Phishing.;
Available copies: 13 / Total copies: 14
unAPI

Walnut Creek [videorecording] Phish. by Phish 9Musical group); JEMP Records (Firm);
Phish: Trey Anistasio (guitar, vocals) ; John Fishman (drums, vocals) ; Mike Gordon (bass, vocals) ; Page McConnell (keyboards, vocals).On July 22, 1997, Phish performed the second show of their U.S. summer tour at Walnut Creek Ampitheatre in Raleigh, NC. A thunderstorm of biblical proportions passed directly over the venue during the show. Fortunately, the recordings remained dry enough to provide the masters for this release. Documents the collision between a force as imaginative and powerful as Phish...and the supreme forces of nature.DVD, NTSC, region 1-6, Dolby digital surround sound.
Subjects: Rock music;
Available copies: 1 / Total copies: 1
unAPI

Fancy Bear goes phishing : the dark history of the information age, in five extraordinary hacks / by Shapiro, Scott J.,author.(CARDINAL)422296;
Includes bibliographical references and index.Introduction: The Brilliant Project -- The great worm -- How the tortoise hacked Achilles -- The Bulgarian virus factory -- The father of dragons -- Winner take all -- Snoop Dogg does his laundry -- How to mudge -- Kill chain -- The Minecraft wars -- Attack of the killer toasters -- Conclusion: The death of solutionism -- Epilogue."A law professor and computer expert's take on how hacks happen and how the Internet can be made more secure"--
Subjects: Case studies.; Hacking; Internet in espionage.; Internet; Phishing;
Available copies: 10 / Total copies: 10
unAPI