gogo
Amazon cover image
Image from Amazon.com

The art of deception : controlling the human element of security / Kevin D. Mitnick & William L. Simon.

By: Contributor(s): Material type: TextTextPublication details: Indianapolis, Ind. : Wiley, c2002.Description: xvi, 352 p. ; 23 cmISBN:
  • 9780764542800 (pbk.) :
  • 9780764542800
Subject(s): DDC classification:
  • 005.8 MIT
LOC classification:
  • 005.8
Contents:
1.Security\'s weakest link -- 2.When innocuous information isn\'t -- 3.The direct attack: just asking for it -- Building trust -- Let me help you -- Can you help me? -- Phony sites and dangerous attachments -- 8.Using sympathy, guilt, and intimidation -- 9.The reverse sting -- 10.Entering the premises -- 11.Combining technology and social engineering -- 12.Attacks on the entry level employee -- 13.Clever cons -- 14.Industrial espionage -- 15.Information security awareness and training -- 16.Recommended corporate information security policies.
Summary: Written from the perspective of a former hacker, this book advises anyone involved with information security protection and policies on how 'social engineering' attacks are executed and how they can be prevented.
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Long Loan TUS: Midlands, Main Library Athlone General Lending 005.8 MIT (Browse shelf(Opens below)) 1 Available 203638

Includes bibliographical references and index.

1.Security\'s weakest link -- 2.When innocuous information isn\'t -- 3.The direct attack: just asking for it -- Building trust -- Let me help you -- Can you help me? -- Phony sites and dangerous attachments -- 8.Using sympathy, guilt, and intimidation -- 9.The reverse sting -- 10.Entering the premises -- 11.Combining technology and social engineering -- 12.Attacks on the entry level employee -- 13.Clever cons -- 14.Industrial espionage -- 15.Information security awareness and training -- 16.Recommended corporate information security policies.

Written from the perspective of a former hacker, this book advises anyone involved with information security protection and policies on how 'social engineering' attacks are executed and how they can be prevented.

Powered by Koha