Record ID | marc_nuls/NULS_PHC_180925.mrc:84503487:1815 |
Source | marc_nuls |
Download Link | /show-records/marc_nuls/NULS_PHC_180925.mrc:84503487:1815?format=raw |
LEADER: 01815cam 22004098a 4500
001 9921755540001661
005 20150423140744.0
008 100727s2011 njua 001 0 eng
010 $a 2010937817
015 $aGBB092455$2bnb
016 7 $a015618472$2Uk
020 $a9780470639535 (pbk.)
020 $a0470639539 (pbk.)
035 $a(CSdNU)u439609-01national_inst
035 $a(OCoLC)635494717
035 $a(OCoLC)635494717
035 $a(OCoLC)635494717
040 $aUKM$cUKM$dBTCTA$dYDXCP$dYBM$dRRR$dORX$dBWX$dTTS
049 $aCNUM
050 4 $aQA76.9.C66$bH33 2011
050 4 $aHM668$b.H33 2011
082 04 $a005.8$222
100 1 $aHadnagy, Christopher.
245 10 $aSocial engineering :$bthe art of human hacking /$cby Christopher Hadnagy.
260 $aHoboken, N.J. :$bWiley ;$aChichester :$bJohn Wiley [distributor], $c2011.
300 $axix, 382 p. :$bill ;$c23 cm.
500 $aIncludes index.
505 0 $aA look into the world of social engineering -- Information gathering -- Elicitation -- Pretexting: how to become anyone -- Mind tricks: psychological principles used in social engineering -- Influence: the power of persuasion -- The tools of the social engineer -- Case studies: dissecting the social engineer -- Prevention and mitigation.
520 $aExamines what social engineering is, the methods used by hackers to gather information, and ways to prevent social engineering threats.
650 0 $aSocial engineering.
650 0 $aComputer hackers.
650 0 $aComputer security.
650 0 $aHuman-computer interaction.
947 $fSOET$hCIRCSTACKS$p$33.24$q1
949 $aHM668 .H33 2011$i31786102569164
994 $a92$bCNU
999 $aHM 668 .H33 2011$wLC$c1$i31786102569164$d1/8/2013$e12/15/2012 $lCIRCSTACKS$mNULS$n5$rY$sY$tBOOK$u5/6/2011