Social engineering in IT security : tools, tactics, and techniques / Sharon Conheady.
This book discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. This practical guide also addresses the impact of new and emerging technol...
Saved in:
Online Access: |
Full Text (via O'Reilly/Safari) |
---|---|
Main Author: | |
Format: | eBook |
Language: | English |
Published: |
New York :
McGraw-Hill Education,
©2014.
|
Subjects: |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | b10456813 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 141110s2014 nyua ob 001 0 eng d | ||
005 | 20240829144902.2 | ||
019 | |a 1164499844 |a 1165388431 |a 1312328666 | ||
020 | |a 9780071818476 | ||
020 | |a 0071818472 | ||
020 | |z 9780071818469 | ||
020 | |z 0071818464 | ||
029 | 1 | |a DEBBG |b BV042490091 | |
029 | 1 | |a DEBSZ |b 434832731 | |
029 | 1 | |a AU@ |b 000072937638 | |
035 | |a (OCoLC)safo894906713 | ||
035 | |a (OCoLC)894906713 |z (OCoLC)1164499844 |z (OCoLC)1165388431 |z (OCoLC)1312328666 | ||
037 | |a safo9780071818469 | ||
040 | |a UMI |b eng |e pn |c UMI |d STF |d B24X7 |d COO |d DEBBG |d OCLCQ |d OCLCO |d OCLCF |d OCLCO |d OCLCQ |d TOH |d YDX |d EBLCP |d DST |d OCLCO |d N$T |d OCLCQ |d OCLCO |d OCLCL |d DXU | ||
049 | |a GWRE | ||
050 | 4 | |a HM668 |b .C66 2014 | |
084 | |a COM053000 |2 bisacsh | ||
100 | 1 | |a Conheady, Sharon. | |
245 | 1 | 0 | |a Social engineering in IT security : |b tools, tactics, and techniques / |c Sharon Conheady. |
260 | |a New York : |b McGraw-Hill Education, |c ©2014. | ||
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a volume |b nc |2 rdacarrier | ||
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Introduction to social engineering -- The legal and ethical aspects of social engineering tests -- Why social engineering works -- Planning your social engineering test -- Research and reconnaissance -- Creating the scenario -- Executing the social engineering test -- Writing the social engineering report -- Tools of the trade -- Defense against the dark arts -- Social engineering: past, present, and future. | |
520 | |a This book discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. This practical guide also addresses the impact of new and emerging technologies on future trends in social engineering. You will explore the evolution of social engineering, from the classic con artist to the modern social engineer; understand the legal and ethical aspects of performing a social engineering test; learn why social engineering works from a victim's point of view; plan a social engineering test; execute both on-site and remote social engineering tests; write an effective social engineering report; learn about various tools, including software, hardware, and on-site tools; and learn how to defend your organization against social engineering attacks. -- |c Edited summary from book. | ||
650 | 0 | |a Information technology |x Security measures. | |
650 | 0 | |a Social engineering. | |
650 | 7 | |a Information technology |x Security measures |2 fast | |
650 | 7 | |a Social engineering |2 fast | |
758 | |i has work: |a Social engineering in IT security (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGY7bdv6vt6T39MBYcWQRq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version : |a Conheady, Sharon. |t Social engineering in IT security. |d New York : McGraw-Hill Education, [2014] |z 9780071818469 |w (DLC) 2014025493 |w (OCoLC)883304925 |
856 | 4 | 0 | |u https://go.oreilly.com/UniOfColoradoBoulder/library/view/~/9780071818469/?ar |z Full Text (via O'Reilly/Safari) |
915 | |a - | ||
956 | |a O'Reilly-Safari eBooks | ||
956 | |b O'Reilly Online Learning: Academic/Public Library Edition | ||
994 | |a 92 |b COD | ||
998 | |b Subsequent record output | ||
999 | f | f | |i 7c720f7f-2de5-5ef2-bd72-c651ec7f93e8 |s a34e15b1-7975-5a11-95cb-cb75b269d6f7 |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e HM668 .C66 2014 |h Library of Congress classification |i web |n 1 |