It looks like you're offline.
Open Library logo
additional options menu

MARC Record from Library of Congress

Record ID marc_loc_2016/BooksAll.2016.part35.utf8:117137152:1290
Source Library of Congress
Download Link /show-records/marc_loc_2016/BooksAll.2016.part35.utf8:117137152:1290?format=raw

LEADER: 01290cam a2200277 a 4500
001 2008019977
003 DLC
005 20141018075400.0
008 080503s2008 enka b 001 0 eng
010 $a 2008019977
020 $a9780566087738 (alk. paper)
020 $a0566087731 (alk. paper)
035 $a(OCoLC)ocn227205858
035 $a(OCoLC)227205858
040 $aDLC$cDLC$dBTCTA$dBWKUK$dBWK$dYDXCP$dBWX$dCDX$dDLC
050 00 $aHM668$b.M36 2008
082 00 $a658.4/7$222
100 1 $aMann, Ian$c(Computer programmer)
245 10 $aHacking the human :$bsocial engineering techniques and security countermeasures /$cIan Mann.
260 $aAldershot, England ;$aBurlington, VT :$bGower,$cc2008.
300 $avii, 254 p. :$bill. ;$c25 cm.
504 $aIncludes bibliographical references (p. [235]-245) and index.
505 0 $aWhat is social engineering? -- Understanding your risks -- People, your weakest link -- Limitations to current security thinking -- Trust me -- Reading a person -- Subconscious mind -- Parent, adult, child -- Vulnerability mapping -- Protection systems -- Awareness and training -- Testing.
650 0 $aSocial engineering.
650 0 $aSocial systems$xPlanning.
856 41 $3Table of contents only$uhttp://www.loc.gov/catdir/toc/ecip0817/2008019977.html