Saved in:
Main Authors: | , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Indianapolis, Ind.
Wiley
[2002]
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9780764542800/?ar |
Summary: | Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented. Mitnick also offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security. |
Item Description: | Includes bibliographical references (pages 339-340) and index. - Print version record |
Physical Description: | 1 Online-Ressource (xvi, 352 pages) |
ISBN: | 0471432288 9780471432289 1280363525 9781280363528 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-04750952X | ||
003 | DE-627-1 | ||
005 | 20240228113849.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2002 xx |||||o 00| ||eng c | ||
020 | |a 0471432288 |c electronic bk. |9 0-471-43228-8 | ||
020 | |a 9780471432289 |c electronic bk. |9 978-0-471-43228-9 | ||
020 | |a 1280363525 |9 1-280-36352-5 | ||
020 | |a 9781280363528 |9 978-1-280-36352-8 | ||
035 | |a (DE-627-1)04750952X | ||
035 | |a (DE-599)KEP04750952X | ||
035 | |a (ORHE)9780764542800 | ||
035 | |a (DE-627-1)04750952X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a UACD |2 bicssc | |
082 | 0 | |a 005.8 |2 21 | |
100 | 1 | |a Mitnick, Kevin |d 1963-2023 |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The art of deception |b controlling the human element of security |c Kevin D. Mitnick and William L. Simon |
264 | 1 | |a Indianapolis, Ind. |b Wiley |c [2002] | |
264 | 4 | |c ©2002 | |
300 | |a 1 Online-Ressource (xvi, 352 pages) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references (pages 339-340) and index. - Print version record | ||
520 | |a Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented. Mitnick also offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Internal security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Sûreté de l'État | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer security | |
650 | 4 | |a Internal security | |
650 | 4 | |a Computer hackers | |
650 | 4 | |a Dispositifs de sécurité | |
650 | 4 | |a Facteurs humains | |
650 | 4 | |a Aspects psychologiques | |
650 | 4 | |a Désinformation | |
650 | 4 | |a Computer security | |
650 | 4 | |a Internal security | |
650 | 4 | |a Computerbeveiliging | |
650 | 4 | |a Computercriminaliteit | |
650 | 4 | |a Psychologische aspecten | |
700 | 1 | |a Simon, William L. |d 1930- |e VerfasserIn |4 aut | |
776 | 1 | |z 0471237124 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0471237124 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780764542800/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-04750952X |
---|---|
_version_ | 1835903204342104064 |
adam_text | |
any_adam_object | |
author | Mitnick, Kevin 1963-2023 Simon, William L. 1930- |
author_facet | Mitnick, Kevin 1963-2023 Simon, William L. 1930- |
author_role | aut aut |
author_sort | Mitnick, Kevin 1963-2023 |
author_variant | k m km w l s wl wls |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)04750952X (DE-599)KEP04750952X (ORHE)9780764542800 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03207cam a22006972c 4500</leader><controlfield tag="001">ZDB-30-ORH-04750952X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228113849.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2002 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0471432288</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-471-43228-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780471432289</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-471-43228-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1280363525</subfield><subfield code="9">1-280-36352-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781280363528</subfield><subfield code="9">978-1-280-36352-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04750952X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP04750952X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780764542800</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04750952X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UACD</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mitnick, Kevin</subfield><subfield code="d">1963-2023</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The art of deception</subfield><subfield code="b">controlling the human element of security</subfield><subfield code="c">Kevin D. Mitnick and William L. Simon</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">Wiley</subfield><subfield code="c">[2002]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi, 352 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 339-340) and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented. Mitnick also offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internal security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sûreté de l'État</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internal security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Dispositifs de sécurité</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Facteurs humains</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Aspects psychologiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Désinformation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internal security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computerbeveiliging</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computercriminaliteit</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Psychologische aspecten</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Simon, William L.</subfield><subfield code="d">1930-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">0471237124</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0471237124</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780764542800/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-04750952X |
illustrated | Not Illustrated |
indexdate | 2025-06-25T12:15:33Z |
institution | BVB |
isbn | 0471432288 9780471432289 1280363525 9781280363528 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xvi, 352 pages) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Wiley |
record_format | marc |
spelling | Mitnick, Kevin 1963-2023 VerfasserIn aut The art of deception controlling the human element of security Kevin D. Mitnick and William L. Simon Indianapolis, Ind. Wiley [2002] ©2002 1 Online-Ressource (xvi, 352 pages) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references (pages 339-340) and index. - Print version record Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented. Mitnick also offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security. Computer security Internal security Sécurité informatique Sûreté de l'État COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer hackers Dispositifs de sécurité Facteurs humains Aspects psychologiques Désinformation Computerbeveiliging Computercriminaliteit Psychologische aspecten Simon, William L. 1930- VerfasserIn aut 0471237124 Erscheint auch als Druck-Ausgabe 0471237124 |
spellingShingle | Mitnick, Kevin 1963-2023 Simon, William L. 1930- The art of deception controlling the human element of security Computer security Internal security Sécurité informatique Sûreté de l'État COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer hackers Dispositifs de sécurité Facteurs humains Aspects psychologiques Désinformation Computerbeveiliging Computercriminaliteit Psychologische aspecten |
title | The art of deception controlling the human element of security |
title_auth | The art of deception controlling the human element of security |
title_exact_search | The art of deception controlling the human element of security |
title_full | The art of deception controlling the human element of security Kevin D. Mitnick and William L. Simon |
title_fullStr | The art of deception controlling the human element of security Kevin D. Mitnick and William L. Simon |
title_full_unstemmed | The art of deception controlling the human element of security Kevin D. Mitnick and William L. Simon |
title_short | The art of deception |
title_sort | art of deception controlling the human element of security |
title_sub | controlling the human element of security |
topic | Computer security Internal security Sécurité informatique Sûreté de l'État COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer hackers Dispositifs de sécurité Facteurs humains Aspects psychologiques Désinformation Computerbeveiliging Computercriminaliteit Psychologische aspecten |
topic_facet | Computer security Internal security Sécurité informatique Sûreté de l'État COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer hackers Dispositifs de sécurité Facteurs humains Aspects psychologiques Désinformation Computerbeveiliging Computercriminaliteit Psychologische aspecten |
work_keys_str_mv | AT mitnickkevin theartofdeceptioncontrollingthehumanelementofsecurity AT simonwilliaml theartofdeceptioncontrollingthehumanelementofsecurity AT mitnickkevin artofdeceptioncontrollingthehumanelementofsecurity AT simonwilliaml artofdeceptioncontrollingthehumanelementofsecurity |