|
|
|
|
LEADER |
00000cim a22000007i 4500 |
001 |
OR_on1337160537 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o h |
007 |
sz zunnnnnuneu |
007 |
cr nnannnuuuuu |
008 |
220726s2022 xx nnnn o i n eng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d ORMDA
|d OCLCF
|d OCLCO
|
024 |
8 |
|
|a 125051AYPOD
|
029 |
1 |
|
|a AU@
|b 000072301876
|
035 |
|
|
|a (OCoLC)1337160537
|
037 |
|
|
|a 125051AYPOD
|b O'Reilly Media
|
050 |
|
4 |
|a HM742
|
082 |
0 |
4 |
|a 364.16/3
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Introduction to social engineering /
|c by Assemble You Limited.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Assemble You,
|c 2022.
|
300 |
|
|
|a 1 online resource (1 audio file (11 min.))
|
306 |
|
|
|a 001100
|
336 |
|
|
|a spoken word
|b spw
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a audio file
|2 rdaft
|
520 |
|
|
|a Welcome to Audio Learning from Assemble You. In his book How to Hack a Human: Cybersecurity for the Mind, security expert Raef Meeuwisse defines social engineering as ... the act of constructing relationships, friendships or other human interactions for the purpose of enticing the recipient to perform an inadvisable action or reveal secret information. In cybersecurity terms, this means preying on our emotional responses to make us voluntarily compromise our own security. In this track, we'll learn about social engineering attacks, the standard techniques used in them, and how we can protect ourselves against them. Learning Objectives Learn what social engineering is, and how it's specifically used in a cyber security context Learn about famous examples of social engineering hacks Learn about the techniques you must use to avoid falling prey to a social engineer.
|
588 |
0 |
|
|a Online resource; title from title details screen (O'Reilly, viewed July 26, 2022).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Social media
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Internet fraud.
|
650 |
|
0 |
|a Social engineering.
|
650 |
|
6 |
|a Médias sociaux
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Fraude informatique.
|
650 |
|
6 |
|a Ingénierie sociale.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Internet fraud
|2 fast
|
650 |
|
7 |
|a Social engineering
|2 fast
|
655 |
|
4 |
|a Downloadable audio books.
|
655 |
|
7 |
|a Audiobooks
|2 fast
|
655 |
|
7 |
|a Audiobooks.
|2 lcgft
|
655 |
|
7 |
|a Livres audio.
|2 rvmgf
|
710 |
2 |
|
|a Assemble You,
|e publisher.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/125051AYPOD/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|