ISBN: 9780471432289
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exh… Plus…
hive.co.uk No. 9780471432289. Frais d'envoiInstock, Despatched same working day before 3pm, GB. (EUR 0.00) Details... |
ISBN: 9780471432289
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exh… Plus…
Thalia.de Nr. A1031398094. Frais d'envoi, , DE. (EUR 0.00) Details... |
2002, ISBN: 9780471432289
Paperback, Publiziert: 2002T, Produktgruppe: Book, Verkaufsrang: 3364928, Managers' Guides to Computing, E-Commerce, Business, Finance & Law, Subjects, Books, Information Management, Amaz… Plus…
amazon.co.uk UK_BOOKSTORE_ Gut Frais d'envoiIn stock. Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 5.59) Details... |
2002, ISBN: 9780471432289
Taschenbuch, Publiziert: 2002-01-01, Produktgruppe: Buch, Kategorien, Bücher, Taschenbücher, 2002, [PU: Wiley]
amazon.de Frais d'envoiDie angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 3.00) Details... |
2002, ISBN: 9780471432289
Taschenbuch, Publiziert: 2002-01-01, Produktgruppe: Buch, Kategorien, Bücher, Taschenbücher, 2002, [PU: Wiley]
amazon.de SerendipityBooksLtd Frais d'envoiGewöhnlich versandfertig in 3 bis 4 Tagen. Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 3.00) Details... |
ISBN: 9780471432289
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exh… Plus…
ISBN: 9780471432289
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exh… Plus…
2002
ISBN: 9780471432289
Paperback, Publiziert: 2002T, Produktgruppe: Book, Verkaufsrang: 3364928, Managers' Guides to Computing, E-Commerce, Business, Finance & Law, Subjects, Books, Information Management, Amaz… Plus…
2002, ISBN: 9780471432289
Taschenbuch, Publiziert: 2002-01-01, Produktgruppe: Buch, Kategorien, Bücher, Taschenbücher, 2002, [PU: Wiley]
2002, ISBN: 9780471432289
Taschenbuch, Publiziert: 2002-01-01, Produktgruppe: Buch, Kategorien, Bücher, Taschenbücher, 2002, [PU: Wiley]
Données bibliographiques du meilleur livre correspondant
Informations détaillées sur le livre - The Art of Deception: Controlling the Human Element of Security
EAN (ISBN-13): 9780471432289
ISBN (ISBN-10): 0471432288
Livre de poche
Date de parution: 2001
Editeur: John Wiley & Sons
368 Pages
Langue: eng/Englisch
Livre dans la base de données depuis 2009-06-13T20:56:25+02:00 (Paris)
Page de détail modifiée en dernier sur 2024-03-05T12:48:07+01:00 (Paris)
ISBN/EAN: 9780471432289
ISBN - Autres types d'écriture:
0-471-43228-8, 978-0-471-43228-9
Autres types d'écriture et termes associés:
Auteur du livre: mitnick kevin, steve wozniak, simon, wiley john sons, patrick manning, element crime, niederhöffer
Titre du livre: the art deception, the art being human, controlling, element
Données de l'éditeur
Auteur: Kevin D. Mitnick; William L. Simon
Titre: The Art of Deception - Controlling the Human Element of Security
Editeur: Wiley; John Wiley & Sons
368 Pages
Date de parution: 2001-09-18
Langue: Anglais
11,99 € (DE)
Not available (reason unspecified)
EA; E107; E-Book; Nonbooks, PBS / Informatik, EDV/Datenkommunikation, Netzwerke; Netzwerksicherheit; Computer Science; Computersicherheit; Informatik; Informatik, EDV / Informatik; Management; Networking / Security; Netzwerke / Sicherheit; Netzwerke / Sicherheit; BB; BC
Foreword. Preface. Introduction. Part 1: Behind the Scenes. Chapter 1: Security's Weakest Link. Part 2: The Art of the Attacker. Chapter 2: When Innocuous Information Isn't. Chapter 3: The Direct Attack: Just Asking for It. Chapter 4: Building Trust. Chapter 5: "Let Me Help You". Chapter 6: "Can You Help Me?". Chapter 7: Phony Sites and Dangerous Attachments. Chapter 8: Using Sympathy, Guilt, and Intimidation. Chapter 9: The Reverse Sting. Part 3: Intruder Alert. Chapter 10: Entering the Premises. Chapter 11: Combining Technology and Social Engineering. Chapter 12: Attacks on the Entry-Level Employee. Chapter 13: Clever Cons. Chapter 14: Industrial Espionage. Part 4: Raising the Bar. Chapter 15: Information Security Awareness and Training. Chapter 16: Recommended Corporate Information SecurityPolicies. Security at a Glance. Sources. Acknowledgments. Index.Autres livres qui pourraient ressembler au livre recherché:
Dernier livre similaire:
0723812237128 The Art of Deception: Controlling the Human Element of Security [Hardcover] By (Kevin D. Mitnick; William L. Simon; Foreword-Steve Wozniak)
- 0723812237128 The Art of Deception: Controlling the Human Element of Security [Hardcover] By (Kevin D. Mitnick; William L. Simon; Foreword-Steve Wozniak)
- 9780471237129 The Art of Deception: Controlling the Human Element of Security (Kevin D. Mitnick; William L. Simon; Foreword-Steve Wozniak)
- The Art of Deception: Controlling the Human Element of Security (Mitnick, Kevin D. and William L. Simon)
- The Art of Deception (Ridley Pearson)
< pour archiver...