Coverart for item
The Resource The art of deception : controlling the human element of security, Kevin D. Mitnick & William L. Simon

The art of deception : controlling the human element of security, Kevin D. Mitnick & William L. Simon

Label
The art of deception : controlling the human element of security
Title
The art of deception
Title remainder
controlling the human element of security
Statement of responsibility
Kevin D. Mitnick & William L. Simon
Creator
Contributor
Subject
Language
eng
Summary
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented. Mitnick also offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security
Cataloging source
UKM
http://library.link/vocab/creatorDate
1963-
http://library.link/vocab/creatorName
Mitnick, Kevin D.
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
M58 2002
Literary form
non fiction
Nature of contents
bibliography
http://library.link/vocab/relatedWorkOrContributorDate
1930-
http://library.link/vocab/relatedWorkOrContributorName
Simon, William L.
http://library.link/vocab/subjectName
  • Computer security
  • Internal security
  • Hackers
  • Hackers
  • Computer security
  • Internal security
Label
The art of deception : controlling the human element of security, Kevin D. Mitnick & William L. Simon
Instantiates
Publication
Bibliography note
Includes bibliographical references (pages 339-340) and index
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Part I: Behind the scenes. Security's weakest link -- Part II: Art of the attacker. When innocuous information isn't ; Direct attack : just asking for it ; Building trust ; Let me help you ; Can you help me? ; Phony sites and dangerous attachments ; Using sympathy, guilt, and intimidation ; Reverse sting -- Part III: Intruder alert. Entering the premises ; Combining technology and social engineering ; Attacks on the entry-level employee ; Clever cons ; Industrial espionage -- Part IV: Raising the bar. Information security awareness and training ; Recommended corporate information security policies -- Security at a glance
Control code
ocm50797873
Dimensions
23 cm
Extent
xvi, 352 pages
Isbn
9780471237129
Lccn
2002512977
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other control number
9780471237129
Other physical details
illustrations
System control number
(OCoLC)50797873
Label
The art of deception : controlling the human element of security, Kevin D. Mitnick & William L. Simon
Publication
Bibliography note
Includes bibliographical references (pages 339-340) and index
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Part I: Behind the scenes. Security's weakest link -- Part II: Art of the attacker. When innocuous information isn't ; Direct attack : just asking for it ; Building trust ; Let me help you ; Can you help me? ; Phony sites and dangerous attachments ; Using sympathy, guilt, and intimidation ; Reverse sting -- Part III: Intruder alert. Entering the premises ; Combining technology and social engineering ; Attacks on the entry-level employee ; Clever cons ; Industrial espionage -- Part IV: Raising the bar. Information security awareness and training ; Recommended corporate information security policies -- Security at a glance
Control code
ocm50797873
Dimensions
23 cm
Extent
xvi, 352 pages
Isbn
9780471237129
Lccn
2002512977
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other control number
9780471237129
Other physical details
illustrations
System control number
(OCoLC)50797873

Library Locations

    • Central LibraryBorrow it
      710 W. Cesar Chavez St, Austin, TX, 78701, US
      30.2713021 -97.7460168
    • Spicewood Springs BranchBorrow it
      8637 Spicewood Springs Rd., Austin, TX, 78759, US
      30.4337083 -97.7730809
    • Twin Oaks BranchBorrow it
      1800 S. Fifth St., Austin, TX, 78704, US
      30.2486884 -97.76239749999999
Processing Feedback ...