|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_on1035515708 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
180512s2018 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d YDX
|d MERUC
|d IDB
|d NLE
|d OCLCQ
|d UKMGB
|d OCLCO
|d LVT
|d UKAHL
|d C6I
|d OCLCQ
|d UX1
|d K6U
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB8J1039
|2 bnb
|
016 |
7 |
|
|a 018867850
|2 Uk
|
019 |
|
|
|a 1035398064
|a 1040676411
|a 1175631673
|
020 |
|
|
|a 9781788838009
|
020 |
|
|
|a 1788838009
|
020 |
|
|
|z 9781788837927
|
020 |
|
|
|a 1788837924
|q (Trade Paper)
|
020 |
|
|
|a 9781788837927
|
024 |
3 |
|
|a 9781788837927
|
029 |
1 |
|
|a UKMGB
|b 018867850
|
029 |
1 |
|
|a AU@
|b 000067096058
|
029 |
1 |
|
|a AU@
|b 000069258378
|
035 |
|
|
|a (OCoLC)1035515708
|z (OCoLC)1035398064
|z (OCoLC)1040676411
|z (OCoLC)1175631673
|
037 |
|
|
|a 9781788838009
|b Packt Publishing
|
050 |
|
4 |
|a TK5105.59
|b .O953 2018eb
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Ozkaya, Erdal.
|
245 |
1 |
0 |
|a Learn Social Engineering :
|b Learn the art of human hacking with an internationally renowned expert.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing,
|c 2018.
|
300 |
|
|
|a 1 online resource (557 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Copyright and Credits; Dedication; Packt Upsell; Foreword; Contributors; Table of Contents; Preface; Chapter 1: Introduction to Social Engineering; Overview of social engineering; Applications of social engineering; The social engineering framework; Information gathering; Nontechnical; Technical; Elicitation; Pretexting; Mind tricks; Persuasion; Tools used in social engineering; Physical tools; Software-based tools; Social engineering examples from Hollywood; Matchstick Men (2003); Catch Me If You Can (2002); Ocean's Eleven (2001); Tips; Summary.
|
505 |
8 |
|
|a Chapter 2: The Psychology of Social Engineering -- Mind Tricks UsedIntroduction; Modes of thinking; Visual thinkers; Auditory thinkers; Kinesthetic thinkers; Determining one's dominant sense and mode of thinking; Importance of understanding a target's mode of thinking; Microexpressions; Anger; Disgust; Contempt; Fear; Surprise; Sadness; Happiness; Training to see microexpressions; How microexpressions are used in a social engineering attack?; Contradictions; Hesitation; Behavioral changes; Gestures; NLP; Codes of NLP; Voice; Sentence structuring; Word choice; Interview and interrogation.
|
505 |
8 |
|
|a Expert interrogation techniquesGesturing; Attentive listening; Building rapport; Human buffer overflow; Fuzzing the brain; Embedded commands; Tips; Summary; Chapter 3: Influence and Persuasion; Introduction; Five fundamental aspects of persuasion; Setting up the environment; Influence tactics; Reciprocation; Obligation; Concession; Scarcity; Authority; Legal authority; Organizational authority; Social authority; Commitment and consistency; Liking; Social proof; Reality alteration (framing); Manipulation; Negative manipulation tactics; Increasing predictability.
|
505 |
8 |
|
|a Controlling the target's environmentCasting doubt; Making the target powerless; Punishing the target; Intimidation; Positive manipulation tips and tactics; Summary; Chapter 4: Information Gathering; Introduction; Gathering information about targets; Technical information-gathering methods; BasKet ; Dradis ; Websites; Search engines; Pipl; Whois.net; Social media; Phishing and spear phishing; Watering holes; Blogs; Telephone; Nontechnical methods; Dumpster diving; Intrusion and impersonation; Tailgating; Shoulder surfing; Observation; Tips; Summary; Chapter 5: Targeting and Recon; Introduction.
|
505 |
8 |
|
|a BanksOld organizations; Organizational employees; IT personnel; Customer support agents; Senior-level staff; Finance personnel; Elderly people; Well-wishers; Tips; Summary; Chapter 6: Elicitation; Introduction; Getting into conversations with strangers; Preloading; Avoiding elicitation; Appealing to egos; Showing mutual interest; Falsifying statements; Flattering; Volunteering information; Assuming knowledge; Using ignorance; Capitalizing on alcoholic drinks; Being a good listener; Using intelligently-posed questions; Assumptive questions; Bracketing; Learning the skill of elicitation; Tips.
|
500 |
|
|
|a Summary.
|
520 |
|
|
|a This book will equip you with a holistic understanding of 'social engineering'. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
630 |
0 |
0 |
|a Kali Linux.
|
630 |
0 |
7 |
|a Kali Linux
|2 fast
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Social engineering.
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Ingénierie sociale.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
7 |
|a Privacy & data protection.
|2 bicssc
|
650 |
|
7 |
|a Network security.
|2 bicssc
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a Computers
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|
650 |
|
7 |
|a Social engineering
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Ozkaya, Erdal.
|t Learn Social Engineering : Learn the art of human hacking with an internationally renowned expert.
|d Birmingham : Packt Publishing, ©2018
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5379705
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n BDZ0036705484
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL5379705
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15343705
|
994 |
|
|
|a 92
|b IZTAP
|