000 | 01319cam a2200277 a 4500 | ||
---|---|---|---|
008 | 100923s2011 inua g b 001 0 eng | ||
020 | _a9780470639535 (pbk.) | ||
020 | _a0470639539 (pbk.) | ||
020 | _a9781118028018 (ebook) | ||
020 | _a9781118029718 (ebook) | ||
020 | _a9781118029749 (ebook) | ||
040 |
_aAE-FuU _cAE-ShKH |
||
041 | 0 | _aeng | |
050 | 0 | 0 |
_aHM668 _b.H33 2011 |
100 | 1 |
_aHadnagy, Christopher. _91893 |
|
245 | 1 | 0 |
_aSocial engineering : _bthe art of human hacking / _cby Christopher Hadnagy ; [foreword by Paul Wilson]. |
260 |
_aIndianapolis, IN : _bWiley, _cc2011. |
||
300 |
_axix, 382 p. : _bill. ; _c23 cm. |
||
500 | _aIncludes index. | ||
505 | 0 | _aA look into the world of social engineering -- Information gathering -- Elicitation -- Pretexting: how to become anyone -- Mind tricks: psychological principles used in social engineering -- Influence: the power of persuasion -- The tools of the social engineer -- Case studies: dissecting the social engineer -- Prevention and mitigation. | |
520 | _aExamines what social engineering is, the methods used by hackers to gather information, and ways to prevent social engineering threats. | ||
650 | 0 | _aSocial engineering. | |
650 | 0 |
_aHackers. _91894 |
|
650 | 0 | _aComputer security. | |
650 | 0 | _aHuman-computer interaction. | |
999 |
_c968 _d968 |