LEADER 01050nam a2200277 i 4500 001 991000269799707536 005 20020509164405.0 008 010704s1965 it ||| | ita 035 $ab11334125-39ule_inst 035 $aPARLA205092$9ExL 040 $aDip.to Filosofia$bita 082 0 $a340.109 100 1 $aVinogradoff, Paul$0210956 245 13$aIl senso comune nel diritto /$cPaul Vinogradoff ; a cura di Stefano Rodota 260 $aMilano :$bGiuffrè,$c1965 300 $aXI, 169 p. ;$c22 cm. 490 0 $aCiviltà del diritto ;$v12 650 4$aDiritto - Gran Bretagna 700 1 $aRodota, Stefano 907 $a.b11334125$b15-11-18$c01-07-02 912 $a991000269799707536 945 $aLE005IF VI C 12$g1$i2005000280917$lle005$o-$pE0.00$q-$rl$s- $t0$u1$v0$w1$x0$y.i11507640$z01-07-02 945 $aLE005IF VI C 12 c. 2$g2$i2005000288623$lle005$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i15867730$z15-11-18 996 $aSenso comune nel diritto$9823661 997 $aUNISALENTO 998 $ale005$b01-01-01$cm$da $e-$fita$git $h3$i1 LEADER 02193nam 2200649Ia 450 001 9910782574703321 005 20230207225815.0 010 $a1-351-15686-1 010 $a1-281-83424-6 010 $a9786611834241 010 $a0-7546-9351-1 035 $a(CKB)1000000000554960 035 $a(OCoLC)503445708 035 $a(CaPaEBR)ebrary10254941 035 $a(SSID)ssj0000741099 035 $a(PQKBManifestationID)12348757 035 $a(PQKBTitleCode)TC0000741099 035 $a(PQKBWorkID)10701920 035 $a(PQKB)11167132 035 $a(SSID)ssj0000166816 035 $a(PQKBManifestationID)11924579 035 $a(PQKBTitleCode)TC0000166816 035 $a(PQKBWorkID)10168724 035 $a(PQKB)11785642 035 $a(MiAaPQ)EBC438809 035 $a(Au-PeEL)EBL438809 035 $a(CaPaEBR)ebr10254941 035 $a(CaONFJC)MIL183424 035 $a(OCoLC)320277573 035 $a(EXLCZ)991000000000554960 100 $a20080503d2008 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHacking the human$b[electronic resource] $esocial engineering techniques and security countermeasures /$fIan Mann 210 $aAldershot $cAshgate$dc2008 215 $a1 online resource (267 p.) 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a1-4094-0958-9 311 $a0-566-08773-1 320 $aIncludes bibliographical references and index. 327 $aWhat is social engineering? -- Understanding your risks -- People, your weakest link -- Limitations to current security thinking -- Trust me -- Reading a person -- Subconscious mind -- Parent, adult, child -- Vulnerability mapping -- Protection systems -- Awareness and training -- Testing. 606 $aSocial engineering 606 $aSocial systems$xPlanning 615 0$aSocial engineering. 615 0$aSocial systems$xPlanning. 676 $a658.4/7 700 $aMann$b Ian$01508843 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910782574703321 996 $aHacking the human$93740335 997 $aUNINA