Cargando…

Introduction to social engineering /

Welcome to Audio Learning from Assemble You. In his book How to Hack a Human: Cybersecurity for the Mind, security expert Raef Meeuwisse defines social engineering as ... the act of constructing relationships, friendships or other human interactions for the purpose of enticing the recipient to perfo...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Audiom
Idioma:Inglés
Publicado: [Place of publication not identified] : Assemble You, 2022.
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cim a22000007i 4500
001 OR_on1337160537
003 OCoLC
005 20231017213018.0
006 m o h
007 sz zunnnnnuneu
007 cr nnannnuuuuu
008 220726s2022 xx nnnn o i n eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d ORMDA  |d OCLCF  |d OCLCO 
024 8 |a 125051AYPOD 
029 1 |a AU@  |b 000072301876 
035 |a (OCoLC)1337160537 
037 |a 125051AYPOD  |b O'Reilly Media 
050 4 |a HM742 
082 0 4 |a 364.16/3  |2 23 
049 |a UAMI 
245 0 0 |a Introduction to social engineering /  |c by Assemble You Limited. 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b Assemble You,  |c 2022. 
300 |a 1 online resource (1 audio file (11 min.)) 
306 |a 001100 
336 |a spoken word  |b spw  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a audio file  |2 rdaft 
520 |a Welcome to Audio Learning from Assemble You. In his book How to Hack a Human: Cybersecurity for the Mind, security expert Raef Meeuwisse defines social engineering as ... the act of constructing relationships, friendships or other human interactions for the purpose of enticing the recipient to perform an inadvisable action or reveal secret information. In cybersecurity terms, this means preying on our emotional responses to make us voluntarily compromise our own security. In this track, we'll learn about social engineering attacks, the standard techniques used in them, and how we can protect ourselves against them. Learning Objectives Learn what social engineering is, and how it's specifically used in a cyber security context Learn about famous examples of social engineering hacks Learn about the techniques you must use to avoid falling prey to a social engineer. 
588 0 |a Online resource; title from title details screen (O'Reilly, viewed July 26, 2022). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Social media  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Internet fraud. 
650 0 |a Social engineering. 
650 6 |a Médias sociaux  |x Sécurité  |x Mesures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Fraude informatique. 
650 6 |a Ingénierie sociale. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Internet fraud  |2 fast 
650 7 |a Social engineering  |2 fast 
655 4 |a Downloadable audio books. 
655 7 |a Audiobooks  |2 fast 
655 7 |a Audiobooks.  |2 lcgft 
655 7 |a Livres audio.  |2 rvmgf 
710 2 |a Assemble You,  |e publisher. 
856 4 0 |u https://learning.oreilly.com/library/view/~/125051AYPOD/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP