Coverart for item
The Resource The art of deception : controlling the human element of security, Kevin D. Mitnick and William L. Simon

The art of deception : controlling the human element of security, Kevin D. Mitnick and William L. Simon

Label
The art of deception : controlling the human element of security
Title
The art of deception
Title remainder
controlling the human element of security
Statement of responsibility
Kevin D. Mitnick and William L. Simon
Creator
Contributor
Subject
Language
eng
Summary
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented. Mitnick also offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security
Cataloging source
N$T
http://library.link/vocab/creatorDate
1963-
http://library.link/vocab/creatorName
Mitnick, Kevin D.
Dewey number
005.8
Index
index present
LC call number
QA76.9.A25
LC item number
M58 2002eb
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorDate
1930-
http://library.link/vocab/relatedWorkOrContributorName
Simon, William L.
http://library.link/vocab/subjectName
  • Computer security
  • Internal security
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • Computer security
  • Internal security
  • Computer hackers
  • Dispositifs de sécurité
  • Facteurs humains
  • Aspects psychologiques
  • Désinformation
  • Computer security
  • Internal security
  • Computerbeveiliging
  • Computercriminaliteit
  • Psychologische aspecten
Label
The art of deception : controlling the human element of security, Kevin D. Mitnick and William L. Simon
Instantiates
Publication
Bibliography note
Includes bibliographical references (pages 339-340) and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Foreword -- Preface -- Introduction -- Part I : Behind the scenes -- Security's weakest link -- Part II : Art of the attacker -- When innocuous information isn't ; Direct attack : just asking for it ; Building trust ; Let me help you ; Can you help me? ; Phony sites and dangerous attachments ; Using sympathy, guilt, and intimidation ; Reverse sting -- Part III : Intruder alert -- Entering the premises ; Combining technology and social engineering ; Attacks on the entry-level employee ; Clever cons ; Industrial espionage -- Part IV : Raising the bar -- Information security awareness and training ; Recommended corporate information security policies -- Security at a glance
Control code
51209751
Dimensions
unknown
Extent
1 online resource (xvi, 352 pages)
Form of item
online
Isbn
9780471432289
Media category
computer
Media MARC source
rdamedia
Media type code
c
http://library.link/vocab/ext/overdrive/overdriveId
d4df0a07-29ea-459e-986e-d880447845a0
Specific material designation
remote
System control number
(OCoLC)51209751
Label
The art of deception : controlling the human element of security, Kevin D. Mitnick and William L. Simon
Publication
Bibliography note
Includes bibliographical references (pages 339-340) and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Foreword -- Preface -- Introduction -- Part I : Behind the scenes -- Security's weakest link -- Part II : Art of the attacker -- When innocuous information isn't ; Direct attack : just asking for it ; Building trust ; Let me help you ; Can you help me? ; Phony sites and dangerous attachments ; Using sympathy, guilt, and intimidation ; Reverse sting -- Part III : Intruder alert -- Entering the premises ; Combining technology and social engineering ; Attacks on the entry-level employee ; Clever cons ; Industrial espionage -- Part IV : Raising the bar -- Information security awareness and training ; Recommended corporate information security policies -- Security at a glance
Control code
51209751
Dimensions
unknown
Extent
1 online resource (xvi, 352 pages)
Form of item
online
Isbn
9780471432289
Media category
computer
Media MARC source
rdamedia
Media type code
c
http://library.link/vocab/ext/overdrive/overdriveId
d4df0a07-29ea-459e-986e-d880447845a0
Specific material designation
remote
System control number
(OCoLC)51209751

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
Processing Feedback ...