|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1042216145 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
180629s2018 inu ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d DG1
|d N$T
|d EBLCP
|d MERER
|d OCLCF
|d UAB
|d OCLCQ
|d IDB
|d YDX
|d OCLCQ
|d LVT
|d U3W
|d OCLCQ
|d UPM
|d COO
|d UKAHL
|d YDXIT
|d OCLCO
|d OCLCQ
|d OCL
|d OCLCQ
|d YOU
|d UMI
|d OCLCQ
|d VT2
|d BRF
|d OCLCQ
|d OCLCO
|d K6U
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1111646795
|a 1111654049
|a 1135503627
|a 1153044060
|a 1179698837
|a 1192339150
|a 1240518667
|
020 |
|
|
|a 9781119433729
|q (electronic book)
|
020 |
|
|
|a 111943372X
|q (electronic book)
|
020 |
|
|
|a 9781119433736
|q (electronic book)
|
020 |
|
|
|a 1119433738
|
020 |
|
|
|a 9781119433750
|
020 |
|
|
|a 1119433754
|
020 |
|
|
|z 9781119433385
|
020 |
|
|
|z 111943338X
|
029 |
1 |
|
|a AU@
|b 000063685632
|
029 |
1 |
|
|a CHNEW
|b 001015445
|
029 |
1 |
|
|a CHVBK
|b 52303458X
|
029 |
1 |
|
|a AU@
|b 000072391832
|
035 |
|
|
|a (OCoLC)1042216145
|z (OCoLC)1111646795
|z (OCoLC)1111654049
|z (OCoLC)1135503627
|z (OCoLC)1153044060
|z (OCoLC)1179698837
|z (OCoLC)1192339150
|z (OCoLC)1240518667
|
037 |
|
|
|a CL0501000087
|b Safari Books Online
|
050 |
|
4 |
|a HM668
|b .H33 2018
|
072 |
|
7 |
|a SOC
|x 002000
|2 bisacsh
|
072 |
|
7 |
|a SOC
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a SOC
|x 026000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
082 |
0 |
4 |
|a 301
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Hadnagy, Christopher,
|e author.
|
245 |
1 |
0 |
|a Social engineering :
|b the science of human hacking /
|c Christopher Hadnagy ; foreword by Steve "Woz" Wozniak.
|
250 |
|
|
|a Second edition.
|
264 |
|
1 |
|a Indianapolis, IN :
|b John Wiley & Sons, Inc.,
|c [2018]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks
|
505 |
0 |
|
|a Cover; Title Page; Copyright; About the Author; About the Technical Editor; Credits; Acknowledgments; Contents; Foreword; Preface; 1 A Look into the New World of Professional Social Engineering; What Has Changed?; Why Should You Read This Book?; An Overview of Social Engineering; The SE Pyramid; OSINT; Pretext Development; Attack Plan; Attack Launch; Reporting; What's in This Book?; Summary; 2 Do You See What I See?; A Real-World Example of Collecting OSINT; Nontechnical OSINT; Observational Skills; Technical Open Source Intelligence; Two Other Things; Tools of the Trade; SET; IntelTechniques.
|
505 |
8 |
|
|a FOCAMaltego: The Granddaddy of Them All; Summary; 3 Profiling People Through Communication; The Approach; Enter the DISC; What Is DISC?; To Know Thyself Is the Beginning of Wisdom; Summary; 4 Becoming Anyone You Want to Be; The Principles of Pretexting; Principle One: Thinking Through Your Goals; Principle Two: Understanding Reality vs. Fiction; Principle Three: Knowing How Far to Go; Principle Four: Avoiding Short-Term Memory Loss; Principle Five: Getting Support for Pretexting; Principle Six: Executing the Pretext; Summary; 5 I Know How to Make You Like Me; The Tribe Mentality.
|
505 |
8 |
|
|a Building Rapport as a Social EngineerThe Moral Molecule; The 10 Principles of Building Rapport; The Rapport Machine; Use the Friends and Family Plan; Read; Take Special Note of Failures; Summary; 6 Under the Influence; Principle One: Reciprocity; Reciprocity in Action; Using Reciprocity as a Social Engineer; Principle Two: Obligation; Obligation in Action; Using Obligation as a Social Engineer; Principle Three: Concession; Concession in Action; Using Concession as a Social Engineer; Principle Four: Scarcity; Scarcity in Action; Using Scarcity as a Social Engineer; Principle Five: Authority.
|
505 |
8 |
|
|a Authority in ActionUsing Authority as a Social Engineer; Principle Six: Consistency and Commitment; Consistency and Commitment in Action; Using Commitment and Consistency as a Social Engineer; Principle Seven: Liking; Using Liking as a Social Engineer; Principle Eight: Social Proof; Social Proof in Action; Using Social Proof as a Social Engineer; Influence vs. Manipulation; Manipulation in Action; Principles of Manipulation; Summary; 7 Building Your Artwork; The Dynamic Rules of Framing; Rule 1: Everything You Say Evokes the Frame.
|
505 |
8 |
|
|a Rule 2: Words T hat Are Defined with the Frame Evoke the FrameRule 3: Negating the Frame; Rule 4: Causing the Target to T hink About the Frame Reinforces the Frame; Elicitation; Ego Appeals; Mutual Interest; Deliberate False Statement; Having Knowledge; The Use of Questions; Summary; 8 I Can See What You Didn't Say; Nonverbals Are Essential; All Your Baselines Belong to Us; Be Careful of Misconceptions; Know the Basic Rules; Understand the Basics of Nonverbals; Comfort vs. Discomfort; Anger; Disgust; Contempt; Fear; Surprise; Sadness; Happiness; Summary; 9 Hacking the Humans.
|
588 |
0 |
|
|a Online resource; title from digital title page (viewed on May 10, 2019).
|
504 |
|
|
|a Includes bibliographical references and index.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Social engineering.
|
650 |
|
0 |
|a Hackers.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Human-computer interaction.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Ingénierie sociale.
|
650 |
|
6 |
|a Pirates informatiques.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a SOCIAL SCIENCE
|x Anthropology
|x General.
|2 bisacsh
|
650 |
|
7 |
|a SOCIAL SCIENCE
|x Regional Studies.
|2 bisacsh
|
650 |
|
7 |
|a SOCIAL SCIENCE
|x Sociology
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Human-computer interaction
|2 fast
|
650 |
|
7 |
|a Hackers
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Social engineering
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Hadnagy, Christopher.
|t Social engineering.
|b Second edition.
|d Indianapolis, IN : John Wiley & Sons, Inc., [2018]
|w (DLC) 2018963781
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119433385/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH33719293
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH33719292
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5436552
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1839267
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15572625
|
994 |
|
|
|a 92
|b IZTAP
|