000 | 01926cam a2200481 a 4500 | ||
---|---|---|---|
001 | 16473802 | ||
003 | OSt | ||
005 | 20230130221512.0 | ||
008 | 100923s2011 inua b 001 0 eng | ||
010 | _a 2010937817 | ||
015 |
_aGBB092455 _2bnb |
||
016 | 7 |
_a015618472 _2Uk |
|
020 | _a9780470639535 (pbk.) | ||
020 | _a0470639539 (pbk.) | ||
020 | _a9781118028018 (ebook) | ||
020 | _a9781118029718 (ebook) | ||
020 | _a9781118029749 (ebook) | ||
035 | _a(OCoLC)ocn635494717 | ||
040 |
_aUKM _cUKM _dBTCTA _dYDXCP _dYBM _dRRR _dORX _dBWX _dTTS _dDLC |
||
042 | _alccopycat | ||
050 | 0 | 0 |
_aHM668 _b.H33 2011 |
082 | 0 | 4 |
_a005.8HAD _222 |
092 | _20 | ||
100 | 1 | _aHadnagy, Christopher. | |
245 | 1 | 0 |
_aSocial engineering : _bthe art of human hacking / _cby Christopher Hadnagy ; [foreword by Paul Wilson]. |
260 |
_aIndianapolis, IN : _bWiley, _cc2011. |
||
300 |
_axix, 382 p. : _bill. ; _c23 cm. |
||
500 | _aIncludes index. | ||
505 | 0 | _aA look into the world of social engineering -- Information gathering -- Elicitation -- Pretexting: how to become anyone -- Mind tricks: psychological principles used in social engineering -- Influence: the power of persuasion -- The tools of the social engineer -- Case studies: dissecting the social engineer -- Prevention and mitigation. | |
520 | _aExamines what social engineering is, the methods used by hackers to gather information, and ways to prevent social engineering threats. | ||
650 | 0 | _aSocial engineering. | |
650 | 0 | _aHackers. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aHuman-computer interaction. | |
650 | 7 |
_aSocial engineering. _2sears |
|
650 | 7 |
_aComputer hackers. _2sears |
|
650 | 7 |
_aComputer security. _2sears |
|
843 | _aphotocopy | ||
887 | _2CamTech Library | ||
906 |
_a7 _bcbc _ccopycat _d3 _encip _f20 _gy-gencatlg |
||
942 |
_2ddc _cBK _n0 |
||
999 |
_c836 _d836 |