Security Home
Security Articles
Security Links
Security Books
Security Tools
Security Keywords
|
Security
The Art of Deception
|
|
See more Amazon Details
|
|
Contents Listing
Foreword.
Preface.
Introduction.
Part 1: Behind the Scenes.
Chapter 1: Security's Weakest Link.
Part 2: The Art of the Attacker.
Chapter 2: When Innocuous Information Isn't.
Chapter 3: The Direct Attack: Just Asking for It.
Chapter 4: Building Trust.
Chapter 5: "Let Me Help You".
Chapter 6: "Can You Help Me?".
Chapter 7: Phony Sites and Dangerous Attachments.
Chapter 8: Using Sympathy, Guilt, and Intimidation.
Chapter 9: The Reverse Sting.
Part 3: Intruder Alert.
Chapter 10: Entering the Premises.
Chapter 11: Combining Technology and Social Engineering.
Chapter 12: Attacks on the Entry-Level Employee.
Chapter 13: Clever Cons.
Chapter 14: Industrial Espionage.
Part 4: Raising the Bar.
Chapter 15: Information Security Awareness and Training.
Chapter 16: Recommended Corporate Information Security Policies.
Security at a Glance.
Sources.
Acknowledgments.
Index.
|
|
Contents
View a contents listing.
Short
Short Description.
Keyword Pages
Keyword Bestsellers
Security Bestsellers The bestselling books on Amazon.
Articles
Microsoft Backtracks onNT4 Support
Real Time Virus Detection for NEC
T-Mobile Hacker in Court
Linux Security Patches Issued
FBI Drops Intelligence Software
Visit our site of the month Load Testing at loadtesting.force9.co.uk
|