|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
OR_on1260344935 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
210717s2021 xx o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e rda
|e pn
|c EBLCP
|d YDX
|d OCLCO
|d UKAHL
|d OCLCF
|d N$T
|d UKMGB
|d TEFOD
|d OCLCQ
|d LIV
|d OCLCO
|d IEEEE
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBC1B5854
|2 bnb
|
016 |
7 |
|
|a 020266720
|2 Uk
|
019 |
|
|
|a 1260191134
|a 1260193158
|a 1262317311
|a 1264371105
|
020 |
|
|
|a 1119805473
|
020 |
|
|
|a 9781119806288
|q (electronic bk.)
|
020 |
|
|
|a 1119806283
|q (electronic bk.)
|
020 |
|
|
|a 9781119805472
|q (electronic bk.)
|
020 |
|
|
|a 9781394177486
|q (electronic bk.)
|
020 |
|
|
|a 1394177488
|q (electronic bk.)
|
020 |
|
|
|z 1119805465
|
020 |
|
|
|z 9781119805465
|
024 |
7 |
|
|a 10.1002/9781394177486
|2 doi
|
029 |
1 |
|
|a AU@
|b 000069704374
|
029 |
1 |
|
|a UKMGB
|b 020266720
|
035 |
|
|
|a (OCoLC)1260344935
|z (OCoLC)1260191134
|z (OCoLC)1260193158
|z (OCoLC)1262317311
|z (OCoLC)1264371105
|
037 |
|
|
|a 9781119805472
|b Wiley
|
037 |
|
|
|a 89E0C72F-838C-459B-B875-C5389DDE232B
|b OverDrive, Inc.
|n http://www.overdrive.com
|
037 |
|
|
|a 9946655
|b IEEE
|
050 |
|
4 |
|a QA76.9.A25
|b R49 2021
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Reynolds, Maxie,
|e author.
|
245 |
1 |
0 |
|a Art of attack :
|b attacker mindset for security professionals.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b John Wiley & Sons,
|c 2021.
|
300 |
|
|
|a 1 online resource (307 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright Page -- About the Author -- Acknowledgments -- Contents -- Introduction -- Who Is This Book For? -- What This Book Covers -- Part I The Attacker Mindset -- Chapter 1 What Is the Attacker Mindset? -- Using the Mindset -- The Attacker and the Mindset -- AMs Is a Needed Set of Skills -- A Quick Note on Scope -- Summary -- Key Message -- Chapter 2 Offensive vs. Defensive Attacker Mindset -- The Offensive Attacker Mindset -- Comfort and Risk -- Planning Pressure and Mental Agility -- Emergency Conditioning -- Defensive Attacker Mindset -- Consistency and Regulation
|
505 |
8 |
|
|a Anxiety Control -- Recovery, Distraction, and Maintenance -- OAMs and DAMs Come Together -- Summary -- Key Message -- Chapter 3 The Attacker Mindset Framework -- Development -- Phase 1 -- Phase 2 -- Application -- Preloading -- "Right Time, Right Place" Preload -- Ethics -- Intellectual Ethics -- Reactionary Ethics -- Social Engineering and Security -- Social Engineering vs. AMs -- Summary -- Key Message -- Part II The Laws and Skills -- Chapter 4 The Laws -- Law 1: Start with the End in Mind -- End to Start Questions -- Robbing a Bank -- Bringing It All together -- The Start of the End
|
505 |
8 |
|
|a Clarity -- EfficiencyWhen you begin -- The Objective -- How to Begin with the End in Mind -- Law 2: Gather, Weaponize, and Leverage Information -- Law 3: Never Break Pretext -- Law 4: Every Move Made Benefits the Objective -- Summary -- Key Message -- Chapter 5 Curiosity, Persistence, and Agility -- Curiosity -- The Exercise: Part 1 -- The Exercise: Part 2 -- Persistence -- Skills and Common Sense -- Professional Common Sense -- Summary -- Key Message -- Chapter 6 Information Processing: Observation and Thinking Techniques -- Your Brain vs. Your Observation -- Observation vs. Heuristics
|
505 |
8 |
|
|a Heuristics -- Behold Linda -- Observation vs. Intuition -- Using Reasoning and Logic -- Observing People -- Observation Exercise -- AMs and Observation -- Tying It All Together -- Critical and Nonlinear Thinking -- Vector vs. Arc -- Education and Critical Thinking -- Workplace Critical Thinking -- Critical Thinking and Other Psychological Constructs -- Critical Thinking Skills -- Nonlinear Thinking -- Tying Them Together -- Summary -- Key Message -- Chapter 7 Information Processing in Practice -- Reconnaissance -- Recon: Passive -- Recon: Active -- OSINT -- OSINT Over the Years -- Intel Types
|
505 |
8 |
|
|a Alternative Data in OSINT -- Signal vs. Noise -- Weaponizing of Information -- Tying Back to the Objective -- Summary -- Key Message -- Part III Tools and Anatomy -- Chapter 8 Attack Strategy -- Attacks in Action -- Strategic Environment -- The Necessity of Engagement and Winning -- The Attack Surface -- Vulnerabilities -- AMs Applied to the Attack Vectors -- Phishing -- Mass Phish -- Spearphish -- Whaling -- Vishing -- Smishing/Smshing -- Impersonation -- Physical -- Back to the Manhattan Bank -- Summary -- Key Message -- Chapter 9 Psychology in Attacks
|
500 |
|
|
|a Setting The Scene: Why Psychology Matters.
|
520 |
|
|
|a The book shows you the laws of the mindset and the techniques attackers use, from persistence to start with the end strategies and non-linear thinking. --
|c Edited summary from book.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Reynolds, Maxie.
|t Art of Attack.
|d Newark : John Wiley & Sons, Incorporated, ©2021
|z 9781119805465
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119805465/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH39022480
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6675133
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2964488
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 302327098
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 17542296
|
994 |
|
|
|a 92
|b IZTAP
|