Social engineering penetration testing: executing social engineering pen tests, assessments and defense
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington
Elsevier Science
2014
|
Schlagworte: | |
Online-Zugang: | FUBA1 Volltext |
Beschreibung: | Social engineering attacks target the weakest link in an organization's security-human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques-including email phishing, telephone pretexting, and physical vectors- can be used to elicit information or manipulate individuals into performing actions that Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9780124201828 0124201822 |
DOI: | 10.1016/C2013-0-12926-1 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV042300248 | ||
003 | DE-604 | ||
005 | 20240105 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2014 |||| o||u| ||||||eng d | ||
020 | |a 9780124201828 |c electronic bk. |9 978-0-12-420182-8 | ||
020 | |a 0124201822 |c electronic bk. |9 0-12-420182-2 | ||
024 | 7 | |a 10.1016/C2013-0-12926-1 |2 doi | |
035 | |a (ZDB-33-EBS)ocn878263510 | ||
035 | |a (OCoLC)878263510 | ||
035 | |a (DE-599)BVBBV042300248 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-188 | ||
082 | 0 | |a 303.3/72 |2 23 | |
100 | 1 | |a Watson, Gavin |d 1982- |e Verfasser |0 (DE-588)1096485265 |4 aut | |
245 | 1 | 0 | |a Social engineering penetration testing |b executing social engineering pen tests, assessments and defense |c Gavin Watson, Andrew Mason, Richard Ackroyd |
264 | 1 | |a Burlington |b Elsevier Science |c 2014 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Social engineering attacks target the weakest link in an organization's security-human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques-including email phishing, telephone pretexting, and physical vectors- can be used to elicit information or manipulate individuals into performing actions that | ||
500 | |a Includes bibliographical references and index | ||
650 | 7 | |a SOCIAL SCIENCE / General |2 bisacsh | |
650 | 7 | |a Social engineering |2 fast | |
650 | 4 | |a Social engineering | |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Social Engineering |g Sicherheit |0 (DE-588)7539699-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Social Engineering |g Sicherheit |0 (DE-588)7539699-3 |D s |
689 | 0 | 1 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Mason, Andrew |e Verfasser |4 aut | |
700 | 1 | |a Ackroyd, Richard |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780124201248 |
856 | 4 | 0 | |u https://doi.org/10.1016/C2013-0-12926-1 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027737240 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1016/C2013-0-12926-1 |l FUBA1 |p ZDB-33-ESD |q ZDB-33-ESD 2021 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152877445283840 |
---|---|
any_adam_object | |
author | Watson, Gavin 1982- Mason, Andrew Ackroyd, Richard |
author_GND | (DE-588)1096485265 |
author_facet | Watson, Gavin 1982- Mason, Andrew Ackroyd, Richard |
author_role | aut aut aut |
author_sort | Watson, Gavin 1982- |
author_variant | g w gw a m am r a ra |
building | Verbundindex |
bvnumber | BV042300248 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-EBS)ocn878263510 (OCoLC)878263510 (DE-599)BVBBV042300248 |
dewey-full | 303.3/72 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 303 - Social processes |
dewey-raw | 303.3/72 |
dewey-search | 303.3/72 |
dewey-sort | 3303.3 272 |
dewey-tens | 300 - Social sciences |
discipline | Soziologie |
doi_str_mv | 10.1016/C2013-0-12926-1 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02662nmm a2200529 c 4500</leader><controlfield tag="001">BV042300248</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240105 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124201828</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-420182-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124201822</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-420182-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/C2013-0-12926-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn878263510</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)878263510</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042300248</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">303.3/72</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Watson, Gavin</subfield><subfield code="d">1982-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1096485265</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Social engineering penetration testing</subfield><subfield code="b">executing social engineering pen tests, assessments and defense</subfield><subfield code="c">Gavin Watson, Andrew Mason, Richard Ackroyd</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington</subfield><subfield code="b">Elsevier Science</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Social engineering attacks target the weakest link in an organization's security-human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques-including email phishing, telephone pretexting, and physical vectors- can be used to elicit information or manipulate individuals into performing actions that</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Social engineering</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social engineering</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Social Engineering</subfield><subfield code="g">Sicherheit</subfield><subfield code="0">(DE-588)7539699-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Social Engineering</subfield><subfield code="g">Sicherheit</subfield><subfield code="0">(DE-588)7539699-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mason, Andrew</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ackroyd, Richard</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780124201248</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/C2013-0-12926-1</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027737240</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1016/C2013-0-12926-1</subfield><subfield code="l">FUBA1</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">ZDB-33-ESD 2021</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042300248 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:42Z |
institution | BVB |
isbn | 9780124201828 0124201822 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027737240 |
oclc_num | 878263510 |
open_access_boolean | |
owner | DE-1046 DE-188 |
owner_facet | DE-1046 DE-188 |
physical | 1 Online-Ressource |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD ZDB-33-ESD ZDB-33-ESD 2021 |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Elsevier Science |
record_format | marc |
spelling | Watson, Gavin 1982- Verfasser (DE-588)1096485265 aut Social engineering penetration testing executing social engineering pen tests, assessments and defense Gavin Watson, Andrew Mason, Richard Ackroyd Burlington Elsevier Science 2014 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Social engineering attacks target the weakest link in an organization's security-human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques-including email phishing, telephone pretexting, and physical vectors- can be used to elicit information or manipulate individuals into performing actions that Includes bibliographical references and index SOCIAL SCIENCE / General bisacsh Social engineering fast Social engineering Penetrationstest (DE-588)4825817-9 gnd rswk-swf Social Engineering Sicherheit (DE-588)7539699-3 gnd rswk-swf Social Engineering Sicherheit (DE-588)7539699-3 s Penetrationstest (DE-588)4825817-9 s 1\p DE-604 Mason, Andrew Verfasser aut Ackroyd, Richard Verfasser aut Erscheint auch als Druck-Ausgabe 9780124201248 https://doi.org/10.1016/C2013-0-12926-1 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Watson, Gavin 1982- Mason, Andrew Ackroyd, Richard Social engineering penetration testing executing social engineering pen tests, assessments and defense SOCIAL SCIENCE / General bisacsh Social engineering fast Social engineering Penetrationstest (DE-588)4825817-9 gnd Social Engineering Sicherheit (DE-588)7539699-3 gnd |
subject_GND | (DE-588)4825817-9 (DE-588)7539699-3 |
title | Social engineering penetration testing executing social engineering pen tests, assessments and defense |
title_auth | Social engineering penetration testing executing social engineering pen tests, assessments and defense |
title_exact_search | Social engineering penetration testing executing social engineering pen tests, assessments and defense |
title_full | Social engineering penetration testing executing social engineering pen tests, assessments and defense Gavin Watson, Andrew Mason, Richard Ackroyd |
title_fullStr | Social engineering penetration testing executing social engineering pen tests, assessments and defense Gavin Watson, Andrew Mason, Richard Ackroyd |
title_full_unstemmed | Social engineering penetration testing executing social engineering pen tests, assessments and defense Gavin Watson, Andrew Mason, Richard Ackroyd |
title_short | Social engineering penetration testing |
title_sort | social engineering penetration testing executing social engineering pen tests assessments and defense |
title_sub | executing social engineering pen tests, assessments and defense |
topic | SOCIAL SCIENCE / General bisacsh Social engineering fast Social engineering Penetrationstest (DE-588)4825817-9 gnd Social Engineering Sicherheit (DE-588)7539699-3 gnd |
topic_facet | SOCIAL SCIENCE / General Social engineering Penetrationstest Social Engineering Sicherheit |
url | https://doi.org/10.1016/C2013-0-12926-1 |
work_keys_str_mv | AT watsongavin socialengineeringpenetrationtestingexecutingsocialengineeringpentestsassessmentsanddefense AT masonandrew socialengineeringpenetrationtestingexecutingsocialengineeringpentestsassessmentsanddefense AT ackroydrichard socialengineeringpenetrationtestingexecutingsocialengineeringpentestsassessmentsanddefense |