Social engineering : the art of human hacking /
Examines what social engineering is, the methods used by hackers to gather information, and ways to prevent social engineering threats.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Indianapolis, IN :
Wiley,
©2011.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn721323812 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 110509s2011 inua o 001 0 eng d | ||
010 | |a 2010937817 | ||
040 | |a N$T |b eng |e pn |c N$T |d E7B |d YDXCP |d UMI |d EBLCP |d UKMGB |d OCLCQ |d B24X7 |d COO |d REDDC |d OCLCQ |d HEBIS |d OCLCQ |d DEBSZ |d OCLCQ |d OCLCA |d XFF |d OCLCQ |d TEFOD |d OCLCQ |d OCLCF |d TEFOD |d OCLCQ |d LOA |d OCLCQ |d AZK |d COCUF |d CNNOR |d Z5A |d PIFBY |d ZCU |d NRC |d MERUC |d OCLCQ |d U3W |d OCLCA |d STF |d WRM |d OCLCQ |d ICG |d INT |d VT2 |d AU@ |d CEF |d OCLCQ |d WYU |d UAB |d A6Q |d TOH |d DKC |d OCLCQ |d HS0 |d UKAHL |d OCLCQ |d OCLCO |d UKCRE |d TUHNV |d OCLCO |d NZAUC |d OCLCQ |d OCLCO | ||
015 | |a GBB092455 |2 bnb | ||
016 | 7 | |a 015618472 |2 Uk | |
019 | |a 741365405 |a 960202338 |a 961630196 |a 962669044 |a 992006884 |a 1037718006 |a 1038665702 |a 1055403489 |a 1062876855 |a 1081235342 |a 1083551624 |a 1103266972 |a 1129330895 |a 1153007883 |a 1243570305 |a 1290627722 | ||
020 | |a 9781118028018 |q (electronic bk.) | ||
020 | |a 1118028015 |q (electronic bk.) | ||
020 | |a 9781118029718 |q (electronic bk.) | ||
020 | |a 1118029712 |q (electronic bk.) | ||
020 | |a 9781118029749 |q (electronic bk.) | ||
020 | |a 1118029747 |q (electronic bk.) | ||
020 | |z 9780470639535 | ||
020 | |z 0470639539 | ||
029 | 1 | |a AU@ |b 000053266179 | |
029 | 1 | |a AU@ |b 000053868553 | |
029 | 1 | |a AU@ |b 000058034341 | |
029 | 1 | |a CHNEW |b 000721549 | |
029 | 1 | |a DEBBG |b BV044154980 | |
029 | 1 | |a DEBSZ |b 368469603 | |
029 | 1 | |a DEBSZ |b 37280585X | |
029 | 1 | |a DEBSZ |b 397002416 | |
029 | 1 | |a HEBIS |b 291536735 | |
029 | 1 | |a NZ1 |b 13850798 | |
029 | 1 | |a NZ1 |b 15412229 | |
035 | |a (OCoLC)721323812 |z (OCoLC)741365405 |z (OCoLC)960202338 |z (OCoLC)961630196 |z (OCoLC)962669044 |z (OCoLC)992006884 |z (OCoLC)1037718006 |z (OCoLC)1038665702 |z (OCoLC)1055403489 |z (OCoLC)1062876855 |z (OCoLC)1081235342 |z (OCoLC)1083551624 |z (OCoLC)1103266972 |z (OCoLC)1129330895 |z (OCoLC)1153007883 |z (OCoLC)1243570305 |z (OCoLC)1290627722 | ||
037 | |a CL0500000097 |b Safari Books Online | ||
037 | |a C5448482-2D18-476D-8529-4F7D72C71324 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.C66 |b H33 2011eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 22 |
049 | |a UAMI | ||
100 | 1 | |a Hadnagy, Christopher. | |
245 | 1 | 0 | |a Social engineering : |b the art of human hacking / |c Christopher Hadnagy. |
260 | |a Indianapolis, IN : |b Wiley, |c ©2011. | ||
300 | |a 1 online resource (xix, 382 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
520 | |a Examines what social engineering is, the methods used by hackers to gather information, and ways to prevent social engineering threats. | ||
505 | 0 | |a A look into the world of social engineering -- Information gathering -- Elicitation -- Pretexting: how to become anyone -- Mind tricks: psychological principles used in social engineering -- Influence: the power of persuasion -- The tools of the social engineer -- Case studies: dissecting the social engineer -- Prevention and mitigation. | |
588 | 0 | |a Print version record. | |
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
650 | 0 | |a Social engineering. | |
650 | 0 | |a Hackers. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Human-computer interaction. | |
650 | 6 | |a Ingénierie sociale. | |
650 | 6 | |a Pirates informatiques. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Hackers |2 fast | |
650 | 7 | |a Human-computer interaction |2 fast | |
650 | 7 | |a Social engineering |2 fast | |
650 | 7 | |a Social engineering. |2 sears | |
650 | 7 | |a Computer hackers. |2 sears | |
650 | 7 | |a Computer security. |2 sears | |
776 | 0 | 8 | |i Print version: |a Hadnagy, Christopher. |t Social engineering. |d Indianapolis, IN : Wiley, ©2011 |z 9780470639535 |w (DLC) 2010937817 |w (OCoLC)635494717 |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9780470639535/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=706746 |z Texto completo |
938 | |a Askews and Holts Library Services |b ASKH |n AH16073210 | ||
938 | |a Books 24x7 |b B247 |n bkb00040813 | ||
938 | |a ebrary |b EBRY |n ebr10465939 | ||
938 | |a EBSCOhost |b EBSC |n 352038 | ||
938 | |a YBP Library Services |b YANK |n 5122850 | ||
994 | |a 92 |b IZTAP |