000 01926cam a2200481 a 4500
001 16473802
003 OSt
005 20230130221512.0
008 100923s2011 inua b 001 0 eng
010 _a 2010937817
015 _aGBB092455
_2bnb
016 7 _a015618472
_2Uk
020 _a9780470639535 (pbk.)
020 _a0470639539 (pbk.)
020 _a9781118028018 (ebook)
020 _a9781118029718 (ebook)
020 _a9781118029749 (ebook)
035 _a(OCoLC)ocn635494717
040 _aUKM
_cUKM
_dBTCTA
_dYDXCP
_dYBM
_dRRR
_dORX
_dBWX
_dTTS
_dDLC
042 _alccopycat
050 0 0 _aHM668
_b.H33 2011
082 0 4 _a005.8HAD
_222
092 _20
100 1 _aHadnagy, Christopher.
245 1 0 _aSocial engineering :
_bthe art of human hacking /
_cby Christopher Hadnagy ; [foreword by Paul Wilson].
260 _aIndianapolis, IN :
_bWiley,
_cc2011.
300 _axix, 382 p. :
_bill. ;
_c23 cm.
500 _aIncludes index.
505 0 _aA look into the world of social engineering -- Information gathering -- Elicitation -- Pretexting: how to become anyone -- Mind tricks: psychological principles used in social engineering -- Influence: the power of persuasion -- The tools of the social engineer -- Case studies: dissecting the social engineer -- Prevention and mitigation.
520 _aExamines what social engineering is, the methods used by hackers to gather information, and ways to prevent social engineering threats.
650 0 _aSocial engineering.
650 0 _aHackers.
650 0 _aComputer security.
650 0 _aHuman-computer interaction.
650 7 _aSocial engineering.
_2sears
650 7 _aComputer hackers.
_2sears
650 7 _aComputer security.
_2sears
843 _aphotocopy
887 _2CamTech Library
906 _a7
_bcbc
_ccopycat
_d3
_encip
_f20
_gy-gencatlg
942 _2ddc
_cBK
_n0
999 _c836
_d836