Social engineering the science of human hacking
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering reli...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Indianapolis, IN
John Wiley & Sons, Inc.
[2018]
|
Ausgabe: | Second edition. |
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-048601616 | ||
003 | DE-627-1 | ||
005 | 20240228120525.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191206s2018 xx |||||o 00| ||eng c | ||
020 | |a 9781119433729 |c electronic book |9 978-1-119-43372-9 | ||
020 | |a 111943372X |c electronic book |9 1-119-43372-X | ||
020 | |a 9781119433736 |c electronic book |9 978-1-119-43373-6 | ||
020 | |a 1119433738 |9 1-119-43373-8 | ||
020 | |a 9781119433750 |9 978-1-119-43375-0 | ||
020 | |a 1119433754 |9 1-119-43375-4 | ||
020 | |a 9781119433385 |9 978-1-119-43338-5 | ||
035 | |a (DE-627-1)048601616 | ||
035 | |a (DE-599)KEP048601616 | ||
035 | |a (ORHE)9781119433385 | ||
035 | |a (DE-627-1)048601616 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a SOC |2 bisacsh | |
072 | 7 | |a SOC |2 bisacsh | |
072 | 7 | |a SOC |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
082 | 0 | |a 301 |2 23 | |
100 | 1 | |a Hadnagy, Christopher |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Social engineering |b the science of human hacking |c Christopher Hadnagy ; foreword by Steve "Woz" Wozniak |
250 | |a Second edition. | ||
264 | 1 | |a Indianapolis, IN |b John Wiley & Sons, Inc. |c [2018] | |
300 | |a 1 online resource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Online resource; title from digital title page (viewed on May 10, 2019) | ||
520 | |a Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks | ||
650 | 0 | |a Social engineering | |
650 | 0 | |a Hackers | |
650 | 0 | |a Computer security | |
650 | 0 | |a Human-computer interaction | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Ingénierie sociale | |
650 | 4 | |a Pirates informatiques | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a SOCIAL SCIENCE ; Anthropology ; General | |
650 | 4 | |a SOCIAL SCIENCE ; Regional Studies | |
650 | 4 | |a SOCIAL SCIENCE ; Sociology ; General | |
650 | 4 | |a Human-computer interaction | |
650 | 4 | |a Hackers | |
650 | 4 | |a Computer security | |
650 | 4 | |a Social engineering | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119433385/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-048601616 |
---|---|
_version_ | 1818767279226093568 |
adam_text | |
any_adam_object | |
author | Hadnagy, Christopher |
author_facet | Hadnagy, Christopher |
author_role | aut |
author_sort | Hadnagy, Christopher |
author_variant | c h ch |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)048601616 (DE-599)KEP048601616 (ORHE)9781119433385 |
dewey-full | 005.8 301 |
dewey-hundreds | 000 - Computer science, information, general works 300 - Social sciences |
dewey-ones | 005 - Computer programming, programs, data, security 301 - Sociology and anthropology |
dewey-raw | 005.8 301 |
dewey-search | 005.8 301 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works 300 - Social sciences |
discipline | Informatik Soziologie |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03689cam a22006492 4500</leader><controlfield tag="001">ZDB-30-ORH-048601616</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120525.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191206s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119433729</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-43372-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">111943372X</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-119-43372-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119433736</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-43373-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119433738</subfield><subfield code="9">1-119-43373-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119433750</subfield><subfield code="9">978-1-119-43375-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119433754</subfield><subfield code="9">1-119-43375-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119433385</subfield><subfield code="9">978-1-119-43338-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048601616</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP048601616</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119433385</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048601616</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">301</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hadnagy, Christopher</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Social engineering</subfield><subfield code="b">the science of human hacking</subfield><subfield code="c">Christopher Hadnagy ; foreword by Steve "Woz" Wozniak</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, IN</subfield><subfield code="b">John Wiley & Sons, Inc.</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from digital title page (viewed on May 10, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Social engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Human-computer interaction</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingénierie sociale</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SOCIAL SCIENCE ; Anthropology ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SOCIAL SCIENCE ; Regional Studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SOCIAL SCIENCE ; Sociology ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Human-computer interaction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social engineering</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119433385/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-048601616 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:47:21Z |
institution | BVB |
isbn | 9781119433729 111943372X 9781119433736 1119433738 9781119433750 1119433754 9781119433385 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource |
psigel | ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | John Wiley & Sons, Inc. |
record_format | marc |
spelling | Hadnagy, Christopher VerfasserIn aut Social engineering the science of human hacking Christopher Hadnagy ; foreword by Steve "Woz" Wozniak Second edition. Indianapolis, IN John Wiley & Sons, Inc. [2018] 1 online resource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Online resource; title from digital title page (viewed on May 10, 2019) Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks Social engineering Hackers Computer security Human-computer interaction Computer Security Ingénierie sociale Pirates informatiques Sécurité informatique SOCIAL SCIENCE ; Anthropology ; General SOCIAL SCIENCE ; Regional Studies SOCIAL SCIENCE ; Sociology ; General TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781119433385/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Hadnagy, Christopher Social engineering the science of human hacking Social engineering Hackers Computer security Human-computer interaction Computer Security Ingénierie sociale Pirates informatiques Sécurité informatique SOCIAL SCIENCE ; Anthropology ; General SOCIAL SCIENCE ; Regional Studies SOCIAL SCIENCE ; Sociology ; General |
title | Social engineering the science of human hacking |
title_auth | Social engineering the science of human hacking |
title_exact_search | Social engineering the science of human hacking |
title_full | Social engineering the science of human hacking Christopher Hadnagy ; foreword by Steve "Woz" Wozniak |
title_fullStr | Social engineering the science of human hacking Christopher Hadnagy ; foreword by Steve "Woz" Wozniak |
title_full_unstemmed | Social engineering the science of human hacking Christopher Hadnagy ; foreword by Steve "Woz" Wozniak |
title_short | Social engineering |
title_sort | social engineering the science of human hacking |
title_sub | the science of human hacking |
topic | Social engineering Hackers Computer security Human-computer interaction Computer Security Ingénierie sociale Pirates informatiques Sécurité informatique SOCIAL SCIENCE ; Anthropology ; General SOCIAL SCIENCE ; Regional Studies SOCIAL SCIENCE ; Sociology ; General |
topic_facet | Social engineering Hackers Computer security Human-computer interaction Computer Security Ingénierie sociale Pirates informatiques Sécurité informatique SOCIAL SCIENCE ; Anthropology ; General SOCIAL SCIENCE ; Regional Studies SOCIAL SCIENCE ; Sociology ; General |
url | https://learning.oreilly.com/library/view/-/9781119433385/?ar |
work_keys_str_mv | AT hadnagychristopher socialengineeringthescienceofhumanhacking |