Social engineering : the science of human hacking
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering reli...
Saved in:
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
Indianapolis, IN :
John Wiley & Sons, Inc.,
[2018]
|
Edition: | Second edition. |
Subjects: | |
ISBN: | 9781119433729 9781119433736 9781119433385 9781119433750 |
Physical Description: | 1 online zdroj |
LEADER | 04297cam a2200673 i 4500 | ||
---|---|---|---|
001 | 104109 | ||
003 | CZ-ZlUTB | ||
005 | 20240914114220.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 180629s2018 inu eof 001 0 eng d | ||
999 | |c 104109 |d 104109 | ||
020 | |a 9781119433729 |q (electronic book) | ||
020 | |a 9781119433736 |q (electronic book) | ||
020 | |z 9781119433385 | ||
020 | |a 9781119433750 | ||
035 | |a (OCoLC)1042216145 |z (OCoLC)1111646795 |z (OCoLC)1111654049 |z (OCoLC)1135503627 |z (OCoLC)1153044060 |z (OCoLC)1179698837 |z (OCoLC)1192339150 |z (OCoLC)1240518667 | ||
040 | |a N$T |b eng |e rda |c N$T |d DG1 |d N$T |d EBLCP |d MERER |d OCLCF |d UAB |d OCLCQ |d IDB |d YDX |d OCLCQ |d LVT |d U3W |d OCLCQ |d UPM |d COO |d UKAHL |d YDXIT |d OCLCO |d OCLCQ |d OCL |d OCLCQ |d YOU |d UMI |d OCLCQ |d VT2 |d BRF | ||
072 | 7 | |a 004 |x Počítačová věda. Výpočetní technika. Informační technologie |9 Konspekt |2 23 | |
080 | |a 004.738.5:316.472.4 |2 MRF | ||
080 | |a 004.056 |2 MRF | ||
080 | |a 343.3/.7:004 |2 MRF | ||
080 | |a 004.056.53 |2 MRF | ||
080 | |a 316.454.54 |2 MRF | ||
080 | |a (0.034.2:08) |2 MRF | ||
080 | |a (035) |2 MRF | ||
080 | |a (078.7) |2 MRF | ||
100 | 1 | |a Hadnagy, Christopher, |e author. | |
245 | 1 | 0 | |a Social engineering : |b the science of human hacking / |c Christopher Hadnagy ; foreword by Steve "Woz" Wozniak. |
250 | |a Second edition. | ||
264 | 1 | |a Indianapolis, IN : |b John Wiley & Sons, Inc., |c [2018] | |
300 | |a 1 online zdroj | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a počítač |b c |2 rdamedia | ||
338 | |a online zdroj |b cr |2 rdacarrier | ||
504 | |a Obsahuje bibliografické odkazy a index. | ||
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks.- Resumí vydavatel | ||
590 | |a John Wiley and Sons |b Wiley Online Library All Obooks | ||
650 | 0 | 7 | |a internetové sociální sítě |7 ph553933 |2 czenas |
650 | 0 | 7 | |a počítačová bezpečnost |7 ph165952 |2 czenas |
650 | 0 | 7 | |a počítačová kriminalita |7 ph124505 |2 czenas |
650 | 0 | 7 | |a hackování |7 ph138199 |2 czenas |
650 | 0 | 7 | |a sociální interakce |7 ph125790 |2 czenas |
650 | 0 | 9 | |a Internet social networks |2 eczenas |
650 | 0 | 9 | |a computer security |2 eczenas |
650 | 0 | 9 | |a computer crimes |2 eczenas |
650 | 0 | 9 | |a computer hacking |2 eczenas |
650 | 0 | 9 | |a social interaction |2 eczenas |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 7 | |a příručky |7 fd133209 |2 czenas | |
655 | 7 | |a případové studie |7 fd133208 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
655 | 9 | |a handbooks and manuals |2 eczenas | |
655 | 9 | |a case studies |2 eczenas | |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729 |y Plný text |
942 | |2 udc | ||
992 | |c EBOOK-TN |c WILEY | ||
993 | |x NEPOSILAT |y EIZ |