MARC details
| 000 -LEADER |
| fixed length control field |
01319cam a2200277 a 4500 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
100923s2011 inua g b 001 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9780470639535 (pbk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
0470639539 (pbk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781118028018 (ebook) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781118029718 (ebook) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781118029749 (ebook) |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
AE-FuU |
| Transcribing agency |
AE-ShKH |
| 041 0# - LANGUAGE CODE |
| Language code of text/sound track or separate title |
eng |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
HM668 |
| Item number |
.H33 2011 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Hadnagy, Christopher. |
| 9 (RLIN) |
1893 |
| 245 10 - TITLE STATEMENT |
| Title |
Social engineering : |
| Remainder of title |
the art of human hacking / |
| Statement of responsibility, etc. |
by Christopher Hadnagy ; [foreword by Paul Wilson]. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. |
| Place of publication, distribution, etc. |
Indianapolis, IN : |
| Name of publisher, distributor, etc. |
Wiley, |
| Date of publication, distribution, etc. |
c2011. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xix, 382 p. : |
| Other physical details |
ill. ; |
| Dimensions |
23 cm. |
| 500 ## - GENERAL NOTE |
| General note |
Includes index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
A look into the world of social engineering -- Information gathering -- Elicitation -- Pretexting: how to become anyone -- Mind tricks: psychological principles used in social engineering -- Influence: the power of persuasion -- The tools of the social engineer -- Case studies: dissecting the social engineer -- Prevention and mitigation. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
Examines what social engineering is, the methods used by hackers to gather information, and ways to prevent social engineering threats. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Social engineering. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Hackers. |
| 9 (RLIN) |
1894 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Human-computer interaction. |