LEADER 02193nam 2200649Ia 450 001 9910812183603321 005 20230207225815.0 010 $a1-351-15686-1 010 $a1-281-83424-6 010 $a9786611834241 010 $a0-7546-9351-1 035 $a(CKB)1000000000554960 035 $a(OCoLC)503445708 035 $a(CaPaEBR)ebrary10254941 035 $a(SSID)ssj0000741099 035 $a(PQKBManifestationID)12348757 035 $a(PQKBTitleCode)TC0000741099 035 $a(PQKBWorkID)10701920 035 $a(PQKB)11167132 035 $a(SSID)ssj0000166816 035 $a(PQKBManifestationID)11924579 035 $a(PQKBTitleCode)TC0000166816 035 $a(PQKBWorkID)10168724 035 $a(PQKB)11785642 035 $a(MiAaPQ)EBC438809 035 $a(Au-PeEL)EBL438809 035 $a(CaPaEBR)ebr10254941 035 $a(CaONFJC)MIL183424 035 $a(OCoLC)320277573 035 $a(EXLCZ)991000000000554960 100 $a20080503d2008 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHacking the human$b[electronic resource] $esocial engineering techniques and security countermeasures /$fIan Mann 210 $aAldershot $cAshgate$dc2008 215 $a1 online resource (267 p.) 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a1-4094-0958-9 311 $a0-566-08773-1 320 $aIncludes bibliographical references and index. 327 $aWhat is social engineering? -- Understanding your risks -- People, your weakest link -- Limitations to current security thinking -- Trust me -- Reading a person -- Subconscious mind -- Parent, adult, child -- Vulnerability mapping -- Protection systems -- Awareness and training -- Testing. 606 $aSocial engineering 606 $aSocial systems$xPlanning 615 0$aSocial engineering. 615 0$aSocial systems$xPlanning. 676 $a658.4/7 700 $aMann$b Ian$01633835 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910812183603321 996 $aHacking the human$93973794 997 $aUNINA