CDN$ 39.78
  • List Price: CDN$ 42.78
  • You Save: CDN$ 3.00 (7%)
Temporarily out of stock.
Order now and we'll deliver when available. We'll e-mail you with an estimated delivery date as soon as we have more information. Your account will only be charged when we ship the item.
Ships from and sold by Gift-wrap available.
Phishing: Cutting the Ide... has been added to your Cart
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Phishing: Cutting the Identity Theft Line Paperback – May 6 2005

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
"Please retry"
CDN$ 39.78
CDN$ 38.26 CDN$ 0.01

Save an Additional 10% on Textbooks When you Join Amazon Student

Special Offers and Product Promotions

  • Amazon Student members save an additional 10% on Textbooks with promo code TEXTBOOK10. Enter code TEXTBOOK10 at checkout. Here's how (restrictions apply)

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your e-mail address or mobile phone number.

Product Details

  • Paperback: 334 pages
  • Publisher: Wiley; 1 edition (May 6 2005)
  • Language: English
  • ISBN-10: 0764584987
  • ISBN-13: 978-0764584985
  • Product Dimensions: 18.5 x 2 x 23.4 cm
  • Shipping Weight: 476 g
  • Average Customer Review: Be the first to review this item
  • Amazon Bestsellers Rank: #2,496,886 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

  • See Complete Table of Contents

Product Description


“…written by a phishing security expert at a top financial institution, this unique book helps IT professionals respond to phishing incidents…” (Computing, 28 July 2005)

From the Back Cover

Have you been caught yet?

They don't just want to know who you are, they want to BE who you are. By duplicating a legitimate website, phishers can convince you that email asking for your personal information came from your bank, an online retailer, even your ISP. Their high-tech identity theft costs American consumers and businesses billions, and if you access the Internet, you're a target. Whether you manage corporate security or just shop online, this book is loaded with weapons you can't afford to be without.

  • Be able to identify and avoid phishing emails and websites
  • Recognize spyware, understand how it benefits phishers, and learn how to get rid of it
  • Take appropriate steps to safeguard your organization against attack
  • Learn how to protect yourself online
  • Find out how to report phishing incidents, and why you should
  • Understand the scope of phishing and how it threatens our online infrastructure
  • Explore additional resources that will keep you up to date
  • Discover how to get off the hook if you've already swallowed the bait

See all Product Description

Inside This Book

(Learn More)
First Sentence
Phishing is automated identity theft. Read the first page
Explore More
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

There are no customer reviews yet on
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on (beta) HASH(0xa566569c) out of 5 stars 11 reviews
9 of 11 people found the following review helpful
HASH(0xa4019168) out of 5 stars Very practical material that's extremely relevant... May 14 2005
By Thomas Duff - Published on
Format: Paperback
Phishing is the scourge of the internet right now. Rachael Lininger and Russell Dean Vines have done a pretty good job in helping individuals and companies understand the problem with their book Phishing - Cutting The Identity Theft Line (Wiley).

Chapter List: Phishing for Phun and Profit; Bait and Switch: Phishing Emails; False Fronts: Phishing Websites; Are You Owned: Understanding Phishing Spyware; Gloom and Doom: You Can't Stop Phishing Completely; Helping Your Organization Avoid Phishing; Fighting Back: How Your Organization Can Respond To Attack; Avoiding the Hook: Consumer Education; Help! I'm a Phish! Consumer Response; Glossary of Phishing-Related Terms; Useful Websites; Identity Theft Affidavit; Index

It used to be I'd see one or two "requests" a week to update my personal information for places like eBay or Citibank. Now it's closer to two or three a day. I'm well aware that these phishing attempts are scams meant to commit identity theft, but apparently we internet-savvy people are in the minority. Lininger and Vines have written a very readable and understandable guide to phishing that can easily be given to nearly anyone to help them protect themselves. The uninitiated will quickly grasp the idea that they shouldn't be responding to emails like these, and as a result they'll be much safer. People who are internet-savvy will learn the tricks that are used by the phishers to make links appear to be something other than what they truly are. Even organizations can benefit from the chapters on what they should do if they find that their servers have been co-opted to run a phishing scam.

Very practical material with the benefit of being a book that's fun to read. This is information that needs to be in the hands of all internet users these days...
5 of 6 people found the following review helpful
HASH(0xa4019570) out of 5 stars Excellent Cover-the-Basics on Phishing Scams May 13 2005
By Marnie_ATL - Published on
Format: Paperback
I was browsing through computer security oriented books recently (May 2005) at a large national book chain. I went through the indexes in the back of the books to see how often or not the category "Phishing" was referenced. It was very few.

I then stumbled across this book. It is very informative to those who are only vaguely familiar with this big scam. The authors even provide sample text and code that phishers have regularly used. As noted in the book, in the earlier days, the phishers often used poorly constructed English in their spam, but the scam has grown in its own sophistication. The authors provide also very clear terminology in regards to this scam, such as the difference between the terms: phish, vs. phishing vs. phishing sites vs. phishing email. They also provide help to those who have fallen for the phishing scams. The authors give the reader step by step instructions on how to go to the police to file a report and to report the issue to the ISP.

The authors are very correct, this problem of phishing is only going to grow larger as a problem online despite making more people aware of it and the unknown backend battle against it by the ISPs. Luckily magazines like Readers' Digest and Newsweek have had occasional articles on phishing. I can only hope spreading more of such awareness minimizes more attacks against unsuspecting users online who are defrauded.

I work in a field where I attempt to minimize phishing scams. I found that such attacks have seemed to increase over the past year. A good starter site for such information is: <a href="[...]"></a> the Anti-Phishing Working Group's website. The phishers typically attack by compromising webservers with outdated OSes and/ or setting up fraudulent hosting accounts with stolen credit cards.

In my own forensic research from time to time with phishing scams on infected webservers, that often the culprits setting up the phishing sites are originating from IPs in foreign countries, notably North Africa and Eastern Europe. The only draw back to this book I can think of is I wish the book had more information pulled from ISPs themselves who fight this serious scam.
1 of 1 people found the following review helpful
HASH(0xa40195e8) out of 5 stars Flakey writing style, but with a lot of information March 26 2006
By thecrwth - Published on
Format: Paperback
The authors claim this book is for a wide range of people from network administrators type people to any one who wants to learn about phishing. Though there is a lot of information in this book, most of it will be common knowledge to people who are employed to keeps networks secure. This books would be great for some one who has been scammed, if you can overlook the flakey writing. For instance, instead of Congressmen they refer to them as "Congresscritters". It was annoying and difficult to keep much of the authors' information seriously. If you can ignore this, you will learn a lot about phishing scams, what to avoid, and how to recover from one.
HASH(0xa4019978) out of 5 stars Detailed and Lengthy Treatment of the Issues Sept. 28 2008
By Danny Parker - Published on
Format: Paperback Verified Purchase
I purchased this book to research the subject of phishing and identity theft for a web project. I was not disappointed with the results, although you have to want this level of detail. For example, the book gives a thorough treatment of the technologies involved and how they work in unison to 'scam' you, driven of course by the anonymous perpetrators. If you dig deep enough and land on the right pages, you will find answers for questions like, "well how do I avoid that?", or "so what can I do to fix this?" I think the authors have thought about what the reader will feel, want and need.

The authors have identified the key readership as "Incident Response Teams", "Information Security Professionals", "Executive Management", and "Everyone who uses the Internet". The technical detail and complexity is great for the first three categories of readership, but stating the book should be read by "everyone who uses the Internet" is, well, stretching it because that is virtually everyone on the planet with an Internet connection. People who go to [...], for example, will have a lot of difficulty following the book and knowing which bits are both relevant and simple enough to put into their daily lives. However, most people understand how a book is presented so long as they follow the Contents page and use it prescriptively; even the technically challenged will get something from it.

One last thing. I like the fact the authors have backed up what they talk about with references and follow on information. For example, when they talk about identity theft and how it impacts everyday people like you and me, they also provide details about what to do and where to go for help. It's one thing to ramble on about a problem; it is another to give guidance and support to those whose lives have been impacted by this social menace.

I could think of worse things to waste $30 on, frankly. I doubt you will regret buying it unless you want something simple and non-technical.
HASH(0xa40199a8) out of 5 stars Helpful info for infosec professionals March 2 2007
By Dr. G. Hinson - Published on
Format: Paperback
Phishing is simply about someone sending out emails inviting you to `update your details', right? Well, yes ... and no. This book ably demonstrates that there is rather more to it than that. Authors Rachael Lininger and Russell Dean Vines explain the basics and then go on to lift the covers on a seedy underworld where criminal hackers combine social engineering and fraud techniques with spyware, rootkits and other tricks to exploit vulnerabilities in email readers and Internet browsers.

Phishing is essentially a detailed security awareness text focusing on phishing and identity theft. Its main aim is to enable the reader to identify and avoid phishing emails and websites, with secondary objectives being to raise awareness of spyware and other forms of malware, and to advise those who have already swallowed the phisher's bait.

The two chapters giving advice for financial services and similar companies whose customers are being phished are fairly weak, but to be fair there is not a huge amount they can do. Two chapters of advice for ordinary computer users go well beyond the usual `watch out for phishing emails', covering aspects such as antivirus and patching.

The following audiences are identified:

- Incident response teams at financial institutions

- Information security professionals and management

- Executive management of any company whose brand might be spoofed

- Everyone who uses the Internet

Phishing is quite a long and specific book that seems unlikely to be read by many non-technical readers, despite its laudable aims. The professional readership will benefit from this book.

Rachael Lininger is billed as a `technical writer in the information security department of a major US financial institution'. It is clear from her writing that she has written up a lot of phishing attacks before.

Russel Dean Vines is a well-qualified information security consultant and cyber-counterterrorism specialist as well as an accomplished jazz musician.

Although the topics are quite technical in places, the book treads a fine line between oversimplifying things and delving too deeply. Rachael's sections include some very welcome tongue-in-cheek asides and even the odd Monty Python reference to brighten up an otherwise rather dry topic. There are plenty of examples of phishing emails, analyzed down to the level of the HTML code, and URLs for more information.

Although things are moving rapidly in this field, Phishing remains relevant and useful two years or more after it was written. The authors' experience evidently qualified them to take a forward-looking perspective. This should definitely be on the bookshelf of the information security department at any eBusiness.