|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1038280769 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
180601s2018 enka o 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d STF
|d TOH
|d CEF
|d OCLCF
|d DEBBG
|d TEFOD
|d CNCEN
|d G3B
|d N$T
|d UAB
|d AU@
|d OCLCQ
|d OCLCO
|d NZAUC
|d OCLCQ
|
020 |
|
|
|a 9781788838009
|q (electronic bk.)
|
020 |
|
|
|a 1788838009
|q (electronic bk.)
|
020 |
|
|
|z 9781788837927
|
035 |
|
|
|a (OCoLC)1038280769
|
037 |
|
|
|a CL0500000968
|b Safari Books Online
|
037 |
|
|
|a D8103007-A76D-46B8-97C2-D920C8D6A09D
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Ozkaya, Erdal,
|e author.
|
245 |
1 |
0 |
|a Learn social engineering :
|b learn the art of human hacking with an internationally renowned expert /
|c Dr. Erdal Ozkaya.
|
264 |
|
1 |
|a Birmingham, UK :
|b Packt Publishing,
|c 2018.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed May 31, 2018).
|
505 |
0 |
|
|a Table of ContentsIntroduction to social engineeringThe psychology of social engineering (mind tricks used)Fundamentals of influence and persuasion Information gatheringTargetting and ReconElicitationPretextingThe tools used in social engineeringPrevention and mitigationCase studies of social engineeringAsk the Experts- Part 1Ask the Experts -- Part 2Ask the Experts -- Part 3Ask the Experts- Part 4.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Kali Linux.
|
630 |
0 |
7 |
|a Kali Linux.
|2 fast
|0 (OCoLC)fst01914587
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Social engineering.
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Ingénierie sociale.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
7 |
|a Privacy & data protection.
|2 bicssc
|
650 |
|
7 |
|a Network security.
|2 bicssc
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
650 |
|
7 |
|a Social engineering.
|2 fast
|0 (OCoLC)fst01122444
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781788837927/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1804695
|
994 |
|
|
|a 92
|b IZTAP
|