Hugendubel.info - Die B2B Online-Buchhandlung 

Merkliste
Die Merkliste ist leer.
Bitte warten - die Druckansicht der Seite wird vorbereitet.
Der Druckdialog öffnet sich, sobald die Seite vollständig geladen wurde.
Sollte die Druckvorschau unvollständig sein, bitte schliessen und "Erneut drucken" wählen.

The Art of Deception

Controlling the Human Element of Security
BuchKartoniert, Paperback
Englisch
Wiley John + Sonserschienen am17.10.2003
Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system.mehr
Verfügbare Formate
BuchKartoniert, Paperback
EUR13,00
BuchGebunden
EUR46,00
E-BookEPUB0 - No protectionE-Book
EUR12,99
E-BookPDF2 - DRM Adobe / Adobe Ebook ReaderE-Book
EUR12,99

Produkt

KlappentextFocusing on the human factors involved with information security, this book explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system.
Details
ISBN/GTIN978-0-7645-4280-0
ProduktartBuch
EinbandartKartoniert, Paperback
Erscheinungsjahr2003
Erscheinungsdatum17.10.2003
SpracheEnglisch
MasseBreite 155 mm, Höhe 230 mm, Dicke 23 mm
Gewicht550 g
Artikel-Nr.10552434

Inhalt/Kritik

Inhaltsverzeichnis
Foreword. Preface. Introduction. Part 1: Behind the Scenes. Chapter 1: Security's Weakest Link. Part 2: The Art of the Attacker. Chapter 2: When Innocuous Information Isn't. Chapter 3: The Direct Attack: Just Asking for It. Chapter 4: Building Trust. Chapter 5: "Let Me Help You". Chapter 6: "Can You Help Me?". Chapter 7: Phony Sites and Dangerous Attachments. Chapter 8: Using Sympathy, Guilt, and Intimidation. Chapter 9: The Reverse Sting. Part 3: Intruder Alert. Chapter 10: Entering the Premises. Chapter 11: Combining Technology and Social Engineering. Chapter 12: Attacks on the Entry-Level Employee. Chapter 13: Clever Cons. Chapter 14: Industrial Espionage. Part 4: Raising the Bar. Chapter 15: Information Security Awareness and Training. Chapter 16: Recommended Corporate Information Security Policies. Security at a Glance. Sources. Acknowledgments. Index.mehr

Autor

Kevin Mitnick is the founder of Defensive Thinking, an information security firm, and speaks widely on security issues. He has appeared on 60 Minutes and elsewhere in the media, and his exploits have spawned several bestselling books, including The Fugitive Game.
William Simon is the bestselling author of more than twenty books.