|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn894906713 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
141110s2014 nyua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d STF
|d B24X7
|d COO
|d DEBBG
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCO
|d OCLCQ
|d TOH
|d YDX
|d EBLCP
|d DST
|d OCLCO
|d N$T
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1164499844
|a 1165388431
|a 1312328666
|
020 |
|
|
|a 9780071818476
|
020 |
|
|
|a 0071818472
|
020 |
|
|
|z 9780071818469
|
020 |
|
|
|z 0071818464
|
029 |
1 |
|
|a DEBBG
|b BV042490091
|
029 |
1 |
|
|a DEBSZ
|b 434832731
|
029 |
1 |
|
|a AU@
|b 000072937638
|
035 |
|
|
|a (OCoLC)894906713
|z (OCoLC)1164499844
|z (OCoLC)1165388431
|z (OCoLC)1312328666
|
037 |
|
|
|a CL0500000499
|b Safari Books Online
|
050 |
|
4 |
|a HM668
|b .C66 2014
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Conheady, Sharon.
|
245 |
1 |
0 |
|a Social engineering in IT security :
|b tools, tactics, and techniques /
|c Sharon Conheady.
|
260 |
|
|
|a New York :
|b McGraw-Hill Education,
|c ©2014.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Introduction to social engineering -- The legal and ethical aspects of social engineering tests -- Why social engineering works -- Planning your social engineering test -- Research and reconnaissance -- Creating the scenario -- Executing the social engineering test -- Writing the social engineering report -- Tools of the trade -- Defense against the dark arts -- Social engineering: past, present, and future.
|
520 |
|
|
|a This book discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. This practical guide also addresses the impact of new and emerging technologies on future trends in social engineering. You will explore the evolution of social engineering, from the classic con artist to the modern social engineer; understand the legal and ethical aspects of performing a social engineering test; learn why social engineering works from a victim's point of view; plan a social engineering test; execute both on-site and remote social engineering tests; write an effective social engineering report; learn about various tools, including software, hardware, and on-site tools; and learn how to defend your organization against social engineering attacks. --
|c Edited summary from book.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
0 |
|a Social engineering.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Ingénierie sociale.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Information technology
|x Security measures
|2 fast
|
650 |
|
7 |
|a Social engineering
|2 fast
|
776 |
0 |
8 |
|i Print version :
|a Conheady, Sharon.
|t Social engineering in IT security.
|d New York : McGraw-Hill Education, [2014]
|z 9780071818469
|w (DLC) 2014025493
|w (OCoLC)883304925
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780071818469/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00072510
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6255356
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2687347
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16840974
|
994 |
|
|
|a 92
|b IZTAP
|