Social engineering for cyber security:
Social engineering is a tactic used to manipulate individuals to divulge confidential information. The types of information these criminals are seeking can vary, and it's important to understand how to identfity these attacks. In this course, we explore how a penetration tester can manipulate a...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch Video |
Sprache: | English |
Veröffentlicht: |
United States
IEEE
2016
|
Schlagworte: | |
Online-Zugang: | FHN01 TUM01 |
Zusammenfassung: | Social engineering is a tactic used to manipulate individuals to divulge confidential information. The types of information these criminals are seeking can vary, and it's important to understand how to identfity these attacks. In this course, we explore how a penetration tester can manipulate a conversation or communications in order to extract useful information |
Beschreibung: | Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020) |
Beschreibung: | 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations |
ISBN: | 9781509005260 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047477364 | ||
003 | DE-604 | ||
005 | 20220217 | ||
007 | cr|uuu---uuuuu | ||
008 | 210921s2016 |||| o||u| ||||||eng d | ||
020 | |a 9781509005260 |9 978-1-5090-0526-0 | ||
035 | |a (ZDB-37-ICG)EDP462 | ||
035 | |a (OCoLC)1269388325 | ||
035 | |a (DE-599)BVBBV047477364 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-92 | ||
082 | 0 | |a 006.312 |2 23 | |
100 | 1 | |a Oriyano, Sean |e Verfasser |4 aut | |
245 | 1 | 0 | |a Social engineering for cyber security |c Sean Oriyano |
264 | 1 | |a United States |b IEEE |c 2016 | |
300 | |a 1 Online-Resource (1 Videodatei, 60 Minuten) |b color illustrations | ||
336 | |b tdi |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020) | ||
520 | |a Social engineering is a tactic used to manipulate individuals to divulge confidential information. The types of information these criminals are seeking can vary, and it's important to understand how to identfity these attacks. In this course, we explore how a penetration tester can manipulate a conversation or communications in order to extract useful information | ||
650 | 4 | |a Data mining | |
650 | 4 | |a Computer security | |
650 | 4 | |a Privacy | |
655 | 7 | |0 (DE-588)4017102-4 |a Film |2 gnd-content | |
912 | |a ZDB-37-ICG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032878925 | ||
966 | e | |u https://ieeexplore.ieee.org/courses/details/EDP462 |l FHN01 |p ZDB-37-ICG |x Verlag |3 Volltext | |
966 | e | |u https://ieeexplore.ieee.org/courses/details/EDP462 |l TUM01 |p ZDB-37-ICG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182793438101504 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Oriyano, Sean |
author_facet | Oriyano, Sean |
author_role | aut |
author_sort | Oriyano, Sean |
author_variant | s o so |
building | Verbundindex |
bvnumber | BV047477364 |
collection | ZDB-37-ICG |
ctrlnum | (ZDB-37-ICG)EDP462 (OCoLC)1269388325 (DE-599)BVBBV047477364 |
dewey-full | 006.312 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.312 |
dewey-search | 006.312 |
dewey-sort | 16.312 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01717nmm a2200385zc 4500</leader><controlfield tag="001">BV047477364</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220217 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210921s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781509005260</subfield><subfield code="9">978-1-5090-0526-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-37-ICG)EDP462</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1269388325</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047477364</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.312</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oriyano, Sean</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Social engineering for cyber security</subfield><subfield code="c">Sean Oriyano</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">United States</subfield><subfield code="b">IEEE</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Resource (1 Videodatei, 60 Minuten)</subfield><subfield code="b">color illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Social engineering is a tactic used to manipulate individuals to divulge confidential information. The types of information these criminals are seeking can vary, and it's important to understand how to identfity these attacks. In this course, we explore how a penetration tester can manipulate a conversation or communications in order to extract useful information</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data mining</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4017102-4</subfield><subfield code="a">Film</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-37-ICG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032878925</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/courses/details/EDP462</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-37-ICG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/courses/details/EDP462</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-37-ICG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4017102-4 Film gnd-content |
genre_facet | Film |
id | DE-604.BV047477364 |
illustrated | Illustrated |
index_date | 2024-07-03T18:11:31Z |
indexdate | 2024-07-10T09:13:12Z |
institution | BVB |
isbn | 9781509005260 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032878925 |
oclc_num | 1269388325 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-92 |
owner_facet | DE-91 DE-BY-TUM DE-92 |
physical | 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations |
psigel | ZDB-37-ICG |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | IEEE |
record_format | marc |
spelling | Oriyano, Sean Verfasser aut Social engineering for cyber security Sean Oriyano United States IEEE 2016 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations tdi rdacontent c rdamedia cr rdacarrier Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020) Social engineering is a tactic used to manipulate individuals to divulge confidential information. The types of information these criminals are seeking can vary, and it's important to understand how to identfity these attacks. In this course, we explore how a penetration tester can manipulate a conversation or communications in order to extract useful information Data mining Computer security Privacy (DE-588)4017102-4 Film gnd-content |
spellingShingle | Oriyano, Sean Social engineering for cyber security Data mining Computer security Privacy |
subject_GND | (DE-588)4017102-4 |
title | Social engineering for cyber security |
title_auth | Social engineering for cyber security |
title_exact_search | Social engineering for cyber security |
title_exact_search_txtP | Social engineering for cyber security |
title_full | Social engineering for cyber security Sean Oriyano |
title_fullStr | Social engineering for cyber security Sean Oriyano |
title_full_unstemmed | Social engineering for cyber security Sean Oriyano |
title_short | Social engineering for cyber security |
title_sort | social engineering for cyber security |
topic | Data mining Computer security Privacy |
topic_facet | Data mining Computer security Privacy Film |
work_keys_str_mv | AT oriyanosean socialengineeringforcybersecurity |