Social engineering : Hacking systems, nations, and societies (Record no. 297476)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01917nam a22001817a 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 97803673171 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 364.168 |
Item number | ERB-S |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Erbschloe, Michael |
245 ## - TITLE STATEMENT | |
Title | Social engineering : Hacking systems, nations, and societies |
Statement of responsibility, etc. | By Michael Erbschloe |
250 ## - EDITION STATEMENT | |
Edition statement | 1 |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Boca Raton : |
Name of publisher, distributor, etc. | CRC Press, Taylor & Francis Group, |
Date of publication, distribution, etc. | ©2020 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | i-ix+245P. |
500 ## - GENERAL NOTE | |
General note | "This book explains how social engineering methods are being commonly used and how organizations and individuals can socially engineer their culture to help minimize the impact of the activities of those who lie, cheat, deceive, and defraud whether they do so from a former Soviet state or from Washington, D.C"-- |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Introduction to social engineering use by bad guys --<br/>The continuum of social engineering approaches --<br/>Criminal social engineering activities --<br/>Securing organizations against social engineering attacks --<br/>Social engineering attacks leveraging PII --<br/>Hacking the democratic electoral process --<br/>Socially engineered attacks by insiders --<br/>Educating people to prevent social engineering attacks --<br/>The accent of cyber darkness. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This book analyzes of the use of social engineering as a tool to hack random systems and target specific systems in several dimensions of society. It shows how social engineering techniques are employed well beyond what hackers do to penetrate computer systems. And it explains how organizations and individuals can socially engineer their culture to help minimize the impact of the activities of those who lie, cheat, deceive, and defraud. After reading this book, you'll be able to analyze how organizations work and the need for security to maintain operations and sustainability, and be able to identify, respond to and counter socially engineered threats to security. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Social engineering. Computer crimes. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Book |
Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Date last checked out | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dept. of Computational Biology and Bioinformatics | Dept. of Computational Biology and Bioinformatics | Processing Center | 28/10/2021 | 2 | 364.168 ERB-S | DCB3994 | 12/08/2022 | 15/01/2022 | 28/10/2021 | Book |