Record ID | marc_loc_2016/BooksAll.2016.part38.utf8:155269053:1673 |
Source | Library of Congress |
Download Link | /show-records/marc_loc_2016/BooksAll.2016.part38.utf8:155269053:1673?format=raw |
LEADER: 01673cam a2200397 a 4500
001 2010937817
003 DLC
005 20140711082944.0
008 100923s2011 inua b 001 0 eng
010 $a 2010937817
015 $aGBB092455$2bnb
016 7 $a015618472$2Uk
020 $a9780470639535 (pbk.)
020 $a0470639539 (pbk.)
020 $a9781118028018 (ebook)
020 $a9781118029718 (ebook)
020 $a9781118029749 (ebook)
035 $a(OCoLC)ocn635494717
040 $aUKM$cUKM$dBTCTA$dYDXCP$dYBM$dRRR$dORX$dBWX$dTTS$dDLC
042 $alccopycat
050 00 $aHM668$b.H33 2011
082 04 $a005.8$222
100 1 $aHadnagy, Christopher.
245 10 $aSocial engineering :$bthe art of human hacking /$cby Christopher Hadnagy ; [foreword by Paul Wilson].
260 $aIndianapolis, IN :$bWiley,$cc2011.
300 $axix, 382 p. :$bill. ;$c23 cm.
500 $aIncludes index.
505 0 $aA look into the world of social engineering -- Information gathering -- Elicitation -- Pretexting: how to become anyone -- Mind tricks: psychological principles used in social engineering -- Influence: the power of persuasion -- The tools of the social engineer -- Case studies: dissecting the social engineer -- Prevention and mitigation.
520 $aExamines what social engineering is, the methods used by hackers to gather information, and ways to prevent social engineering threats.
650 0 $aSocial engineering.
650 0 $aHackers.
650 0 $aComputer security.
650 0 $aHuman-computer interaction.
650 7 $aSocial engineering.$2sears
650 7 $aComputer hackers.$2sears
650 7 $aComputer security.$2sears