| 000 | 01854cam a2200445 a 4500 | ||
|---|---|---|---|
| 001 | 16473802 | ||
| 003 | OSt | ||
| 005 | 20230106052752.0 | ||
| 008 | 100923s2011 inua b 001 0 eng | ||
| 010 | _a 2010937817 | ||
| 015 |
_aGBB092455 _2bnb |
||
| 016 | 7 |
_a015618472 _2Uk |
|
| 020 | _a9780470639535 (pbk.) | ||
| 020 | _a0470639539 (pbk.) | ||
| 020 | _a9781118028018 (ebook) | ||
| 020 | _a9781118029718 (ebook) | ||
| 020 | _a9781118029749 (ebook) | ||
| 035 | _a(OCoLC)ocn635494717 | ||
| 040 |
_aUKM _cUCC Library _dBTCTA _dYDXCP _dYBM _dRRR _dORX _dBWX _dTTS _dDLC |
||
| 042 | _alccopycat | ||
| 050 | 0 | 0 |
_aHM668 _b.H33 2011 |
| 082 | 0 | 4 |
_a005.8 _221 |
| 100 | 1 | _aHadnagy, Christopher. | |
| 245 | 1 | 0 |
_aSocial engineering : _bthe art of human hacking / _cby Christopher Hadnagy ; [foreword by Paul Wilson]. |
| 260 |
_aIndianapolis, IN : _bWiley, _cc2011. |
||
| 300 |
_axix, 382 p. : _bill. ; _c23 cm. |
||
| 500 | _aIncludes index. | ||
| 505 | 0 | _aA look into the world of social engineering -- Information gathering -- Elicitation -- Pretexting: how to become anyone -- Mind tricks: psychological principles used in social engineering -- Influence: the power of persuasion -- The tools of the social engineer -- Case studies: dissecting the social engineer -- Prevention and mitigation. | |
| 520 | _aExamines what social engineering is, the methods used by hackers to gather information, and ways to prevent social engineering threats. | ||
| 650 | 0 | _aSocial engineering. | |
| 650 | 0 | _aHackers. | |
| 650 | 0 | _aComputer security. | |
| 650 | 0 | _aHuman-computer interaction. | |
| 650 | 7 |
_aSocial engineering. _2sears |
|
| 650 | 7 |
_aComputer hackers. _2sears |
|
| 650 | 7 |
_aComputer security. _2sears |
|
| 906 |
_a7 _bcbc _ccopycat _d3 _encip _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cBK _n0 |
||
| 999 |
_c96 _d96 |
||