It looks like you're offline.
Open Library logo
additional options menu

MARC Record from harvard_bibliographic_metadata

Record ID harvard_bibliographic_metadata/ab.bib.12.20150123.full.mrc:74682263:1484
Source harvard_bibliographic_metadata
Download Link /show-records/harvard_bibliographic_metadata/ab.bib.12.20150123.full.mrc:74682263:1484?format=raw

LEADER: 01484nam a2200265Ia 4500
001 012063661-1
005 20090825161750.0
008 090730s2002 inua b 001 0 eng d
020 $a9780764542800
020 $a076454280X
035 0 $aocm428739808
040 $aUMI$cUMI$dMH
090 $aQA76.9.A25$bM585 2002
100 1 $aMitnick, Kevin D.$q(Kevin David),$d1963-
245 14 $aThe art of deception :$bcontrolling the human element of security /$cKevin D. Mitnick & William L. Simon.
260 $aIndianapolis, Ind. :$bWiley Pub.,$cc2002.
300 $axvi, 352 p. :$bill. ;$c23 cm.
504 $aIncludes bibliographical references (p. [339]-340) and index.
505 0 $aPart I: Behind the scenes. Security's weakest link -- Part II: Art of the attacker. When innocuous information isn't ; Direct attack : just asking for it ; Building trust ; Let me help you ; Can you help me? ; Phony sites and dangerous attachments ; Using sympathy, guilt, and intimidation ; Reverse sting -- Part III: Intruder alert. Entering the premises ; Combining technology and social engineering ; Attacks on the entry-level employee ; Clever cons ; Industrial espionage -- Part IV: Raising the bar. Information security awareness and training ; Recommended corporate information security policies -- Security at a glance.
650 0 $aComputer security.
650 0 $aInternal security.
650 0 $aComputer hackers.
700 1 $aSimon, William L.,$d1930-
988 $a20090825
906 $0OCLC