The art of deception : controlling the human element of security /
Mitnick, Kevin D. 1963-
The art of deception : controlling the human element of security / Kevin D. Mitnick & William L. Simon. - Indianapolis, Ind. : Wiley, c2002. - xvi, 352 p. ; 24 cm.
CW219 CW248
Includes bibliographical references.
1. Security's weakest link -- 2. When innocuous information isn't -- 3.The direct attack: just asking for it -- Building trust -- "Let me help you" -- "Can you help me?" -- Phony sites and dangerous attachments -- 8. Using sympathy, guilt, and intimidation -- 9.The reverse sting -- 10. Entering the premises -- 11. Combining technology and social engineering -- 12. Attacks on the entry level employee -- 13.Clever cons -- 14.Industrial espionage -- 15. Information security awareness and training -- 16. Recommended corporate information security policies.
076454280X (pbk) 9780764542800 9780764542800: £9.99
Computer security.
Internal security.
Information technology--Social aspects
Computer hackers.
Computers and IT.
Privacy & data protection
Data encryption
Network security
Computer security
Computer networking & communications
658.47
The art of deception : controlling the human element of security / Kevin D. Mitnick & William L. Simon. - Indianapolis, Ind. : Wiley, c2002. - xvi, 352 p. ; 24 cm.
CW219 CW248
Includes bibliographical references.
1. Security's weakest link -- 2. When innocuous information isn't -- 3.The direct attack: just asking for it -- Building trust -- "Let me help you" -- "Can you help me?" -- Phony sites and dangerous attachments -- 8. Using sympathy, guilt, and intimidation -- 9.The reverse sting -- 10. Entering the premises -- 11. Combining technology and social engineering -- 12. Attacks on the entry level employee -- 13.Clever cons -- 14.Industrial espionage -- 15. Information security awareness and training -- 16. Recommended corporate information security policies.
076454280X (pbk) 9780764542800 9780764542800: £9.99
Computer security.
Internal security.
Information technology--Social aspects
Computer hackers.
Computers and IT.
Privacy & data protection
Data encryption
Network security
Computer security
Computer networking & communications
658.47