LEADER 01212nam2 22002653i 450 001 SUN0110251 005 20170711103923.92 010 $a88-13-19972-4$d0.00 100 $a20170711d1996 |0itac50 ba 101 $aita 102 $aIT 105 $a|||| ||||| 200 1 $a2: *Piani operativi e di sviluppo; regolazione, governo e direzione per obiettivi$fGastone Ceccanti 210 $aPadova$cCEDAM$d1996 215 $aXIII, 484 p.$d25 cm. 461 1$1001SUN0110250$12001 $a*Corso di tecnica imprenditoriale$fGastone Ceccanti$v2$1210 $aPadova$cCEDAM$d1996$1215 $a2 volumi$d25 cm. 620 $dPadova$3SUNL000007 700 1$aCeccanti$b, Gastone$3SUNV085245$0108661 712 $aCEDAM$3SUNV005537$4650 801 $aIT$bSOL$c20181109$gRICA 912 $aSUN0110251 950 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI ECONOMIA$d03 PREST FONDO IZZO16 $e03 BDE780 DONO PROF. IZZO. 995 $aUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI ECONOMIA$bIT-CE0106$gBDE$h780$kPREST FONDO IZZO16$op$qa$uDONO PROF. IZZO. 996 $aPiani operativi e di sviluppo, regolazione, governo e direzione per obiettivi$91099872 997 $aUNICAMPANIA LEADER 03880nam 2200505 450 001 9910555267703321 005 20210726164852.0 010 $a1-119-43375-4 010 $a1-119-43372-X 010 $a1-119-43373-8 035 $a(CKB)4100000004974312 035 $a(MiAaPQ)EBC5436552 035 $a(CaSebORM)9781119433385 035 $a(EXLCZ)994100000004974312 100 $a20180716d2018 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSocial engineering $ethe science of human hacking /$fChristopher Hadnagy 205 $aSecond edition. 210 1$aIndianapolis, IN :$cWiley,$d[2018] 210 4$dİ2018 215 $a1 online resource (322 pages) 300 $aIncludes index. 311 $a9781119433385 320 $aIncludes bibliographical references and index. 327 $aA look into the world of professional social engineering -- Do you see what I see? -- Profiling people through communication -- Becoming anyone you want to be -- I know how to make you like me -- Under the influence -- Building your artwork -- I can see what you didn't say -- Hacking the humans -- Do you have a M.A.P.P.? -- Now what? 330 $aHarden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker?s repertoire?why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the ?system? in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer?s bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don?t work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer?s playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense. 606 $aSocial engineering 606 $aHackers 608 $aElectronic books. 615 0$aSocial engineering. 615 0$aHackers. 676 $a301 700 $aHadnagy$b Christopher$0873539 702 $aWozniak$b Steve$f1950- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910555267703321 996 $aSocial Engineering$92680758 997 $aUNINA