The Art Of Deception: Controlling The Human Element Of Security 9780764542800 下载 pdf 百度网盘 epub 免费 2025 电子书 mobi 在线

The Art Of Deception: Controlling The Human Element Of Security 9780764542800精美图片
》The Art Of Deception: Controlling The Human Element Of Security 9780764542800电子书籍版权问题 请点击这里查看《

The Art Of Deception: Controlling The Human Element Of Security 9780764542800书籍详细信息

  • ISBN:9780764542800
  • 作者:暂无作者
  • 出版社:暂无出版社
  • 出版时间:2003-10
  • 页数:231
  • 价格:100.70
  • 纸张:胶版纸
  • 装帧:平装
  • 开本:16开
  • 语言:未知
  • 丛书:暂无丛书
  • TAG:暂无
  • 豆瓣评分:暂无豆瓣评分
  • 豆瓣短评:点击查看
  • 豆瓣讨论:点击查看
  • 豆瓣目录:点击查看
  • 读书笔记:点击查看
  • 原文摘录:点击查看

内容简介:

Theworld′smostinfamoushackeroffersaninsider′sviewofthelow–techthreatstohigh–techsecurityKevinMitnick′sexploitsasacyber–desperadoandfugitiveformoneofthemostexhaustiveFBImanhuntsinhistoryandhavespawneddozensofarticles,books,films,anddocumentaries.Sincehisreleasefromfederalprison,in1998,Mitnickhasturnedhislifearoundandestablishedhimselfasoneofthemostsought–aftercomputersecurityexpertsworldwide.Now,inTheArtofDeception,theworld′smostnotorioushackergivesnewmeaningtotheoldadage,"Ittakesathieftocatchathief."Focusingonthehumanfactorsinvolvedwithinformationsecurity,Mitnickexplainswhyallthefirewallsandencryptionprotocolsintheworldwillneverbeenoughtostopasavvygrifterintentonriflingacorporatedatabaseoranirateemployeedeterminedtocrashasystem.Withthehelpofmanyfascinatingtruestoriesofsuccessfulattacksonbusinessandgovernment,heillustratesjusthowsusceptibleeventhemostlocked–downinformationsystemsaretoaslickconartistimpersonatinganIRSagent.Narratingfromthepointsofviewofboththeattackerandthevictims,heexplainswhyeachattackwassosuccessfulandhowitcouldhavebeenpreventedinanengagingandhighlyreadablestylereminiscentofatrue–crimenovel.And,perhapsmostimportantly,Mitnickoffersadviceforpreventingthesetypesofsocialengineeringhacksthroughsecurityprotocols,trainingprograms,andmanualsthataddressthehumanelementofsecurity.


书籍目录:

Foreword

Preface.

Introduction

Part 1: Behind the Scenes.

Chapter 1: Security's Weakest Link.

Part 2: The Art of the Attacker.

Chapter 2: When Innocuous Information Isn't.

Chapter 3: The Direct Attack: Just Asking for It.

Chapter 4: Building Trust.

Chapter 5: "Let Me Help You".

Chapter 6: "Can You Help Me?".

Chapter 7: Phony Sites and Dangerous Attachments.

Chapter 8: Using Sympathy, Guilt, and Intimidation.

Chapter 9: The Reverse Sting.

Part 3: Intruder Alert.

Chapter 10: Entering the Premises.

Chapter 11: Combining Technology and Social Engineering.

Chapter 12: Attacks on the Entry-Level Employee.

Chapter 13: Clever Cons.

Chapter 14: Industrial Espionage.

Part 4: Raising the Bar.

Chapter 15: Information Security Awareness and Training.

Chapter 16: Recommended Corporate Information Security

Policies.

Security at a Glance

Sources

Acknowledgments

Index.


作者介绍:

Kevin Mitnick is the founder of Defensive Thinking, an information security firm, and speaks widely on security issues. He has appeared on 60 Minutes and elsewhere in the media, and his exploits have spawned several bestselling books, including The Fugitive Game.William Simon is the bestselling author of more than twenty books.


出版社信息:

暂无出版社相关信息,正在全力查找中!


书籍摘录:

暂无相关书籍摘录,正在全力查找中!



原文赏析:

暂无原文赏析,正在全力查找中!


其它内容:

媒体评论

  "As a whole,Walden's collection is a valuable addition to the philosophical literature on photography. It is well organized and contains a sustained discussion of many of the more provocative claims that philosophers have made about photography. It is still an open question whether any of these claims are true, but rather than simply dwelling upon the banal truths that we all already agree upon, it is a lot more interesting." (The Journal of Aesthetics and Art Criticism, Summer 2010)"This is a very valuable collection that gathers together a set of articles and issues that should be of general interest to philosophers of art." (Notre Dame Philosophical Reviews, February 2009)"How does one accept or deny 'reality' in photographic excursions? This is the central issue in this extraordinary compilation of 13 essays by contemporary philosophers who argue back and forth (in editor Walden's clever arrangement) so that readers must engage their own minds within the constantly conflicting (theoretical and personal) propositions/explanations. This is a rich, provocative, intelligent, challenging, and important compilation. Highly recommended." (Choice, November 2008)"Many of the essays are well written and indeed groundbreaking … .Given its overall depth, the anthology is worth reading by any critic, curator or student of the arts." (Prefix Photo, 2008)"Will enlighten the student and refresh the informed. Contributes greatly to the literature and will occupy a favorite spot on the book shelves." (Metapsychology)


书籍介绍

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief." Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.


书籍真实打分

  • 故事情节:5分

  • 人物塑造:4分

  • 主题深度:5分

  • 文字风格:5分

  • 语言运用:5分

  • 文笔流畅:9分

  • 思想传递:3分

  • 知识深度:4分

  • 知识广度:9分

  • 实用性:6分

  • 章节划分:5分

  • 结构布局:4分

  • 新颖与独特:4分

  • 情感共鸣:6分

  • 引人入胜:3分

  • 现实相关:6分

  • 沉浸感:6分

  • 事实准确性:4分

  • 文化贡献:7分


网站评分

  • 书籍多样性:8分

  • 书籍信息完全性:3分

  • 网站更新速度:4分

  • 使用便利性:9分

  • 书籍清晰度:7分

  • 书籍格式兼容性:9分

  • 是否包含广告:4分

  • 加载速度:8分

  • 安全性:6分

  • 稳定性:4分

  • 搜索功能:4分

  • 下载便捷性:6分


下载点评

  • 愉快的找书体验(540+)
  • 经典(504+)
  • epub(515+)
  • 无多页(183+)
  • 中评(291+)
  • mobi(135+)
  • 差评少(230+)
  • 小说多(170+)
  • 不亏(380+)
  • 内容完整(636+)

下载评价

  • 网友 方***旋:

    真的很好,里面很多小说都能搜到,但就是收费的太多了

  • 网友 堵***格:

    OK,还可以

  • 网友 车***波:

    很好,下载出来的内容没有乱码。

  • 网友 游***钰:

    用了才知道好用,推荐!太好用了

  • 网友 权***颜:

    下载地址、格式选择、下载方式都还挺多的

  • 网友 汪***豪:

    太棒了,我想要azw3的都有呀!!!

  • 网友 石***烟:

    还可以吧,毕竟也是要成本的,付费应该的,更何况下载速度还挺快的

  • 网友 焦***山:

    不错。。。。。

  • 网友 养***秋:

    我是新来的考古学家

  • 网友 马***偲:

    好 很好 非常好 无比的好 史上最好的

  • 网友 师***怡:

    说的好不如用的好,真心很好。越来越完美


随机推荐