Social engineering in IT security : tools, tactics, and techniques / Sharon Conheady.

This book discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. This practical guide also addresses the impact of new and emerging technol...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via O'Reilly/Safari)
Main Author: Conheady, Sharon
Format: eBook
Language:English
Published: New York : McGraw-Hill Education, ©2014.
Subjects:

MARC

LEADER 00000cam a2200000 a 4500
001 b10456813
006 m o d
007 cr |||||||||||
008 141110s2014 nyua ob 001 0 eng d
005 20240829144902.2
019 |a 1164499844  |a 1165388431  |a 1312328666 
020 |a 9780071818476 
020 |a 0071818472 
020 |z 9780071818469 
020 |z 0071818464 
029 1 |a DEBBG  |b BV042490091 
029 1 |a DEBSZ  |b 434832731 
029 1 |a AU@  |b 000072937638 
035 |a (OCoLC)safo894906713 
035 |a (OCoLC)894906713  |z (OCoLC)1164499844  |z (OCoLC)1165388431  |z (OCoLC)1312328666 
037 |a safo9780071818469 
040 |a UMI  |b eng  |e pn  |c UMI  |d STF  |d B24X7  |d COO  |d DEBBG  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCO  |d OCLCQ  |d TOH  |d YDX  |d EBLCP  |d DST  |d OCLCO  |d N$T  |d OCLCQ  |d OCLCO  |d OCLCL  |d DXU 
049 |a GWRE 
050 4 |a HM668  |b .C66 2014 
084 |a COM053000  |2 bisacsh 
100 1 |a Conheady, Sharon. 
245 1 0 |a Social engineering in IT security :  |b tools, tactics, and techniques /  |c Sharon Conheady. 
260 |a New York :  |b McGraw-Hill Education,  |c ©2014. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
505 0 |a Introduction to social engineering -- The legal and ethical aspects of social engineering tests -- Why social engineering works -- Planning your social engineering test -- Research and reconnaissance -- Creating the scenario -- Executing the social engineering test -- Writing the social engineering report -- Tools of the trade -- Defense against the dark arts -- Social engineering: past, present, and future. 
520 |a This book discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. This practical guide also addresses the impact of new and emerging technologies on future trends in social engineering. You will explore the evolution of social engineering, from the classic con artist to the modern social engineer; understand the legal and ethical aspects of performing a social engineering test; learn why social engineering works from a victim's point of view; plan a social engineering test; execute both on-site and remote social engineering tests; write an effective social engineering report; learn about various tools, including software, hardware, and on-site tools; and learn how to defend your organization against social engineering attacks. --  |c Edited summary from book. 
650 0 |a Information technology  |x Security measures. 
650 0 |a Social engineering. 
650 7 |a Information technology  |x Security measures  |2 fast 
650 7 |a Social engineering  |2 fast 
758 |i has work:  |a Social engineering in IT security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGY7bdv6vt6T39MBYcWQRq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version :  |a Conheady, Sharon.  |t Social engineering in IT security.  |d New York : McGraw-Hill Education, [2014]  |z 9780071818469  |w (DLC) 2014025493  |w (OCoLC)883304925 
856 4 0 |u https://go.oreilly.com/UniOfColoradoBoulder/library/view/~/9780071818469/?ar  |z Full Text (via O'Reilly/Safari) 
915 |a - 
956 |a O'Reilly-Safari eBooks 
956 |b O'Reilly Online Learning: Academic/Public Library Edition 
994 |a 92  |b COD 
998 |b Subsequent record output 
999 f f |i 7c720f7f-2de5-5ef2-bd72-c651ec7f93e8  |s a34e15b1-7975-5a11-95cb-cb75b269d6f7 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e HM668 .C66 2014  |h Library of Congress classification  |i web  |n 1