Social engineering : the science of human hacking

Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering reli...

Full description

Saved in:
Bibliographic Details
Main Author: Hadnagy, Christopher, (Author)
Format: eBook
Language: English
Published: Indianapolis, IN : John Wiley & Sons, Inc., [2018]
Edition: Second edition.
Subjects:
ISBN: 9781119433729
9781119433736
9781119433385
9781119433750
Physical Description: 1 online zdroj

Cover

Table of contents

LEADER 04297cam a2200673 i 4500
001 104109
003 CZ-ZlUTB
005 20240914114220.0
006 m o d
007 cr cnu|||unuuu
008 180629s2018 inu eof 001 0 eng d
999 |c 104109  |d 104109 
020 |a 9781119433729  |q (electronic book) 
020 |a 9781119433736  |q (electronic book) 
020 |z 9781119433385 
020 |a 9781119433750 
035 |a (OCoLC)1042216145  |z (OCoLC)1111646795  |z (OCoLC)1111654049  |z (OCoLC)1135503627  |z (OCoLC)1153044060  |z (OCoLC)1179698837  |z (OCoLC)1192339150  |z (OCoLC)1240518667 
040 |a N$T  |b eng  |e rda  |c N$T  |d DG1  |d N$T  |d EBLCP  |d MERER  |d OCLCF  |d UAB  |d OCLCQ  |d IDB  |d YDX  |d OCLCQ  |d LVT  |d U3W  |d OCLCQ  |d UPM  |d COO  |d UKAHL  |d YDXIT  |d OCLCO  |d OCLCQ  |d OCL  |d OCLCQ  |d YOU  |d UMI  |d OCLCQ  |d VT2  |d BRF 
072 7 |a 004  |x Počítačová věda. Výpočetní technika. Informační technologie  |9 Konspekt  |2 23 
080 |a 004.738.5:316.472.4  |2 MRF 
080 |a 004.056  |2 MRF 
080 |a 343.3/.7:004  |2 MRF 
080 |a 004.056.53  |2 MRF 
080 |a 316.454.54  |2 MRF 
080 |a (0.034.2:08)   |2 MRF 
080 |a (035)  |2 MRF 
080 |a (078.7)  |2 MRF 
100 1 |a Hadnagy, Christopher,  |e author. 
245 1 0 |a Social engineering :  |b the science of human hacking /  |c Christopher Hadnagy ; foreword by Steve "Woz" Wozniak. 
250 |a Second edition. 
264 1 |a Indianapolis, IN :  |b John Wiley & Sons, Inc.,  |c [2018] 
300 |a 1 online zdroj 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
504 |a Obsahuje bibliografické odkazy a index. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks.- Resumí vydavatel 
590 |a John Wiley and Sons  |b Wiley Online Library All Obooks 
650 0 7 |a internetové sociální sítě  |7 ph553933  |2 czenas 
650 0 7 |a počítačová bezpečnost  |7 ph165952  |2 czenas 
650 0 7 |a počítačová kriminalita  |7 ph124505  |2 czenas 
650 0 7 |a hackování  |7 ph138199  |2 czenas 
650 0 7 |a sociální interakce  |7 ph125790  |2 czenas 
650 0 9 |a Internet social networks  |2 eczenas 
650 0 9 |a computer security  |2 eczenas 
650 0 9 |a computer crimes  |2 eczenas 
650 0 9 |a computer hacking  |2 eczenas 
650 0 9 |a social interaction  |2 eczenas 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 7 |a příručky  |7 fd133209  |2 czenas 
655 7 |a případové studie  |7 fd133208  |2 czenas 
655 9 |a electronic books  |2 eczenas 
655 9 |a handbooks and manuals  |2 eczenas 
655 9 |a case studies  |2 eczenas 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781119433729  |y Plný text 
942 |2 udc 
992 |c EBOOK-TN  |c WILEY 
993 |x NEPOSILAT  |y EIZ