Cargando…

Social engineering in IT security : tools, tactics, and techniques /

This book discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. This practical guide also addresses the impact of new and emerging technol...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Conheady, Sharon
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : McGraw-Hill Education, ©2014.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn894906713
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 141110s2014 nyua ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d STF  |d B24X7  |d COO  |d DEBBG  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCO  |d OCLCQ  |d TOH  |d YDX  |d EBLCP  |d DST  |d OCLCO  |d N$T  |d OCLCQ  |d OCLCO 
019 |a 1164499844  |a 1165388431  |a 1312328666 
020 |a 9780071818476 
020 |a 0071818472 
020 |z 9780071818469 
020 |z 0071818464 
029 1 |a DEBBG  |b BV042490091 
029 1 |a DEBSZ  |b 434832731 
029 1 |a AU@  |b 000072937638 
035 |a (OCoLC)894906713  |z (OCoLC)1164499844  |z (OCoLC)1165388431  |z (OCoLC)1312328666 
037 |a CL0500000499  |b Safari Books Online 
050 4 |a HM668  |b .C66 2014 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Conheady, Sharon. 
245 1 0 |a Social engineering in IT security :  |b tools, tactics, and techniques /  |c Sharon Conheady. 
260 |a New York :  |b McGraw-Hill Education,  |c ©2014. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
505 0 |a Introduction to social engineering -- The legal and ethical aspects of social engineering tests -- Why social engineering works -- Planning your social engineering test -- Research and reconnaissance -- Creating the scenario -- Executing the social engineering test -- Writing the social engineering report -- Tools of the trade -- Defense against the dark arts -- Social engineering: past, present, and future. 
520 |a This book discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. This practical guide also addresses the impact of new and emerging technologies on future trends in social engineering. You will explore the evolution of social engineering, from the classic con artist to the modern social engineer; understand the legal and ethical aspects of performing a social engineering test; learn why social engineering works from a victim's point of view; plan a social engineering test; execute both on-site and remote social engineering tests; write an effective social engineering report; learn about various tools, including software, hardware, and on-site tools; and learn how to defend your organization against social engineering attacks. --  |c Edited summary from book. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Information technology  |x Security measures. 
650 0 |a Social engineering. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Ingénierie sociale. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Information technology  |x Security measures  |2 fast 
650 7 |a Social engineering  |2 fast 
776 0 8 |i Print version :  |a Conheady, Sharon.  |t Social engineering in IT security.  |d New York : McGraw-Hill Education, [2014]  |z 9780071818469  |w (DLC) 2014025493  |w (OCoLC)883304925 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780071818469/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00072510 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6255356 
938 |a EBSCOhost  |b EBSC  |n 2687347 
938 |a YBP Library Services  |b YANK  |n 16840974 
994 |a 92  |b IZTAP