Social engineering the science of human hacking

Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering reli...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Hadnagy, Christopher (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Indianapolis, IN John Wiley & Sons, Inc. [2018]
Ausgabe:Second edition.
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-048601616
003 DE-627-1
005 20240228120525.0
007 cr uuu---uuuuu
008 191206s2018 xx |||||o 00| ||eng c
020 |a 9781119433729  |c electronic book  |9 978-1-119-43372-9 
020 |a 111943372X  |c electronic book  |9 1-119-43372-X 
020 |a 9781119433736  |c electronic book  |9 978-1-119-43373-6 
020 |a 1119433738  |9 1-119-43373-8 
020 |a 9781119433750  |9 978-1-119-43375-0 
020 |a 1119433754  |9 1-119-43375-4 
020 |a 9781119433385  |9 978-1-119-43338-5 
035 |a (DE-627-1)048601616 
035 |a (DE-599)KEP048601616 
035 |a (ORHE)9781119433385 
035 |a (DE-627-1)048601616 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
072 7 |a SOC  |2 bisacsh 
072 7 |a SOC  |2 bisacsh 
072 7 |a SOC  |2 bisacsh 
082 0 |a 005.8  |2 23 
082 0 |a 301  |2 23 
100 1 |a Hadnagy, Christopher  |e VerfasserIn  |4 aut 
245 1 0 |a Social engineering  |b the science of human hacking  |c Christopher Hadnagy ; foreword by Steve "Woz" Wozniak 
250 |a Second edition. 
264 1 |a Indianapolis, IN  |b John Wiley & Sons, Inc.  |c [2018] 
300 |a 1 online resource 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Includes bibliographical references and index. - Online resource; title from digital title page (viewed on May 10, 2019) 
520 |a Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks 
650 0 |a Social engineering 
650 0 |a Hackers 
650 0 |a Computer security 
650 0 |a Human-computer interaction 
650 2 |a Computer Security 
650 4 |a Ingénierie sociale 
650 4 |a Pirates informatiques 
650 4 |a Sécurité informatique 
650 4 |a SOCIAL SCIENCE ; Anthropology ; General 
650 4 |a SOCIAL SCIENCE ; Regional Studies 
650 4 |a SOCIAL SCIENCE ; Sociology ; General 
650 4 |a Human-computer interaction 
650 4 |a Hackers 
650 4 |a Computer security 
650 4 |a Social engineering 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781119433385/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-048601616
_version_ 1818767279226093568
adam_text
any_adam_object
author Hadnagy, Christopher
author_facet Hadnagy, Christopher
author_role aut
author_sort Hadnagy, Christopher
author_variant c h ch
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)048601616
(DE-599)KEP048601616
(ORHE)9781119433385
dewey-full 005.8
301
dewey-hundreds 000 - Computer science, information, general works
300 - Social sciences
dewey-ones 005 - Computer programming, programs, data, security
301 - Sociology and anthropology
dewey-raw 005.8
301
dewey-search 005.8
301
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
300 - Social sciences
discipline Informatik
Soziologie
edition Second edition.
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03689cam a22006492 4500</leader><controlfield tag="001">ZDB-30-ORH-048601616</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120525.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191206s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119433729</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-43372-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">111943372X</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-119-43372-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119433736</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-43373-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119433738</subfield><subfield code="9">1-119-43373-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119433750</subfield><subfield code="9">978-1-119-43375-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119433754</subfield><subfield code="9">1-119-43375-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119433385</subfield><subfield code="9">978-1-119-43338-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048601616</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP048601616</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119433385</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048601616</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">301</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hadnagy, Christopher</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Social engineering</subfield><subfield code="b">the science of human hacking</subfield><subfield code="c">Christopher Hadnagy ; foreword by Steve "Woz" Wozniak</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, IN</subfield><subfield code="b">John Wiley &amp; Sons, Inc.</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from digital title page (viewed on May 10, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Social engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Human-computer interaction</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingénierie sociale</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SOCIAL SCIENCE ; Anthropology ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SOCIAL SCIENCE ; Regional Studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SOCIAL SCIENCE ; Sociology ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Human-computer interaction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social engineering</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119433385/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-048601616
illustrated Not Illustrated
indexdate 2024-12-18T08:47:21Z
institution BVB
isbn 9781119433729
111943372X
9781119433736
1119433738
9781119433750
1119433754
9781119433385
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource
psigel ZDB-30-ORH
publishDate 2018
publishDateSearch 2018
publishDateSort 2018
publisher John Wiley & Sons, Inc.
record_format marc
spelling Hadnagy, Christopher VerfasserIn aut
Social engineering the science of human hacking Christopher Hadnagy ; foreword by Steve "Woz" Wozniak
Second edition.
Indianapolis, IN John Wiley & Sons, Inc. [2018]
1 online resource
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Includes bibliographical references and index. - Online resource; title from digital title page (viewed on May 10, 2019)
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks
Social engineering
Hackers
Computer security
Human-computer interaction
Computer Security
Ingénierie sociale
Pirates informatiques
Sécurité informatique
SOCIAL SCIENCE ; Anthropology ; General
SOCIAL SCIENCE ; Regional Studies
SOCIAL SCIENCE ; Sociology ; General
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781119433385/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Hadnagy, Christopher
Social engineering the science of human hacking
Social engineering
Hackers
Computer security
Human-computer interaction
Computer Security
Ingénierie sociale
Pirates informatiques
Sécurité informatique
SOCIAL SCIENCE ; Anthropology ; General
SOCIAL SCIENCE ; Regional Studies
SOCIAL SCIENCE ; Sociology ; General
title Social engineering the science of human hacking
title_auth Social engineering the science of human hacking
title_exact_search Social engineering the science of human hacking
title_full Social engineering the science of human hacking Christopher Hadnagy ; foreword by Steve "Woz" Wozniak
title_fullStr Social engineering the science of human hacking Christopher Hadnagy ; foreword by Steve "Woz" Wozniak
title_full_unstemmed Social engineering the science of human hacking Christopher Hadnagy ; foreword by Steve "Woz" Wozniak
title_short Social engineering
title_sort social engineering the science of human hacking
title_sub the science of human hacking
topic Social engineering
Hackers
Computer security
Human-computer interaction
Computer Security
Ingénierie sociale
Pirates informatiques
Sécurité informatique
SOCIAL SCIENCE ; Anthropology ; General
SOCIAL SCIENCE ; Regional Studies
SOCIAL SCIENCE ; Sociology ; General
topic_facet Social engineering
Hackers
Computer security
Human-computer interaction
Computer Security
Ingénierie sociale
Pirates informatiques
Sécurité informatique
SOCIAL SCIENCE ; Anthropology ; General
SOCIAL SCIENCE ; Regional Studies
SOCIAL SCIENCE ; Sociology ; General
url https://learning.oreilly.com/library/view/-/9781119433385/?ar
work_keys_str_mv AT hadnagychristopher socialengineeringthescienceofhumanhacking