1. Introduction to phishing
2. Phishing attacks : information flow and chokepoints
3. Spoofing and countermeasures
4. Pharming and client side attacks
5. Status quo security tools
6. Adding context to phishing attacks : spear phishing
7. Human-centered design considerations
9. Mutual authentication and trusted pathways
10. Biometrics and authentication
11. Making takedown difficult
12. Protecting browser state
15. Microsoft's anti-phishing technologies and tactics
17. Experimental evaluation of attacks and countermeasures
18. Liability for phishing