Social engineering : (Record no. 968)

MARC details
000 -LEADER
fixed length control field 01319cam a2200277 a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100923s2011 inua g b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780470639535 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0470639539 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118028018 (ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118029718 (ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118029749 (ebook)
040 ## - CATALOGING SOURCE
Original cataloging agency AE-FuU
Transcribing agency AE-ShKH
041 0# - LANGUAGE CODE
Language code of text/sound track or separate title eng
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HM668
Item number .H33 2011
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Hadnagy, Christopher.
9 (RLIN) 1893
245 10 - TITLE STATEMENT
Title Social engineering :
Remainder of title the art of human hacking /
Statement of responsibility, etc. by Christopher Hadnagy ; [foreword by Paul Wilson].
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Indianapolis, IN :
Name of publisher, distributor, etc. Wiley,
Date of publication, distribution, etc. c2011.
300 ## - PHYSICAL DESCRIPTION
Extent xix, 382 p. :
Other physical details ill. ;
Dimensions 23 cm.
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note A look into the world of social engineering -- Information gathering -- Elicitation -- Pretexting: how to become anyone -- Mind tricks: psychological principles used in social engineering -- Influence: the power of persuasion -- The tools of the social engineer -- Case studies: dissecting the social engineer -- Prevention and mitigation.
520 ## - SUMMARY, ETC.
Summary, etc. Examines what social engineering is, the methods used by hackers to gather information, and ways to prevent social engineering threats.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Social engineering.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hackers.
9 (RLIN) 1894
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Human-computer interaction.
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
          Main Library University Of Fujairah University Of Fujairah   11/15/2022   HM668 .H33 2011 000666 11/15/2022 C.1 11/15/2022 Book