Listing 1 - 10 of 58 << page
of 6
>>
Sort by

Book
Les innovations sociales dans l'aide à domicile : La Fédération Adessadomicile
Author:
ISBN: 2749260590 Year: 2018 Publisher: Toulouse (33 avenue Marcel Dassault 31500) : ERES,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Version courte : L'ambition de ce livre est de rendre visible le travail que réalisent au quotidien les associations d'aide à domicile. Au plus près des citoyens vulnérables, elles expérimentent des réponses, des solutions pour toujours plus de cohésion sociale et d'émancipation des personnes. Version longue : Le présent ouvrage se propose d'envisager l'innovation sociale à partir de cas pratiques dans le domaine de l'aide à domicile. A l'heure où l'innovation sociale est admise dans les politiques publiques, labellisée, considérée comme un remède miracle, il est important de montrer que les associations, dans des domaines trop souvent négligés comme le service à la personne, ont une réelle capacité d'innovation. L'ouvrage reprend les monographies réalisées au sein de la fédération Adessadomicile, à partir d'entretiens et de l'analyse de la documentation propre à chaque initiative, pour faire émerger des réflexions transversales quant aux enjeux de l'innovation sociale dans l'aide à domicile.


Book
Social engineering : the science of human hacking
Authors: ---
ISBN: 1119433754 111943372X 1119433738 Year: 2018 Publisher: Indianapolis, IN : Wiley,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the “system” in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer’s bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don’t work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer’s playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.


Book
Experimentierklauseln für die Verwaltung und ihre verfassungsrechtlichen Grenzen : zugleich ein Beitrag zu Art. 7a BerlHG
Author:
ISBN: 3428105583 Year: 2001 Publisher: Berlin Duncker und Humblot

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Geordnete Gemeinschaft : Architekte als Sozialingenieure - Deutschland und Schweden im 20. Jahrhundert.
Author:
ISBN: 9783837614268 Year: 2010 Publisher: Bielefeld Transcript

Loading...
Export citation

Choose an application

Bookmark

Abstract

At the beginning of the 20th century, social order seemed to be disintegrating. Architects in Sweden and Germany reacted to this trend by means of "social engineering". Into the 1960s they attempted to overcome the negative consequences of modernization with the very scientific and technical means that created the situation in the first place. They ordered "space" in order to turn society back into "community". Kuchenbuch shows through the examples of German and Swedish architectural discourse that social engineering may be described as transnational formation. Zu Beginn des 20. Jahrhunderts schien die soziale Ordnung zu zerfallen. Darauf reagierten Architekten in Schweden und Deutschland mittels Social Engineering: Bis in die 1960er Jahre hinein versuchten sie, die negativen Folgen der Modernisierung mit den wissenschaftlichen und technischen Verfahren zu überwinden, die diese selbst bereitstellte. Sie ordneten den Raum, um die zerfallende Gesellschaft wieder in eine Gemeinschaft zu verwandeln - im "Dritten Reich", im schwedischen "Volks-Heim" und darüber hinaus. David Kuchenbuch zeigt am Beispiel deutscher und schwedischer Architekturdiskurse im 20. Jahrhundert, dass sich das "Social Engineering" in der Moderne als transnationale Formation beschreiben lässt.


Book
Gouverner par le chaos : ingénierie sociale et mondialisation
Author:
ISBN: 9782315006113 2315006112 Year: 2014 Publisher: Paris: Max Milo,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Social engineering
Authors: --- ---
ISBN: 0773596003 9780773596009 9780886292706 Year: 1996 Publisher: Ottawa, [Ontario] : Carleton University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Social engineering in the 20th century has brought about some large-scale changes in society, often the result of visionary social projects, and plans designed on a grand and ideal scale. Such plans have often extracted terrible human costs. Numerous failures have marked 20th century social engineering.


Book
Wissenschaft und ›race relations‹ : Repräsentationen von Multiethnizität in Großbritannien 1950-1980
Author:
ISBN: 311079070X Year: 2022 Publisher: Boston : De Gruyter,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This discourse-analytical study of the research into race relations carried out in Great Britain from 1950 to 1980 links perspectives from intellectual history and action theory. It shows that race relations research was a scholarly reaction to migration and the race riots, and that there was an interrelationship between scholarly discourse and social change, which had an enormous influence on political thought in Great Britain.


Book
Behavioral cybersecurity : applications of personality psychology and computer science
Authors: ---
ISBN: 0429866852 0429866844 0429461488 Year: 2019 Publisher: Boca Raton : Taylor & Francis, CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Since the introduction and proliferation of the Internet, problems involved with maintaining cybersecurity has grown exponentially, and have evolved into many forms of exploitation. Yet, Cybersecurity has had far too little study and research. Virtually all of the Research that has taken place in cybersecurity over many years, has been done by those with computer science, electrical engineering, and mathematics backgrounds. However, many cybersecurity researchers have come to realize that to gain a full understanding of how to protect a cyber environment requires not only the knowledge of those researchers in computer science, engineering and mathematics, but those who have a deeper understanding of human behavior: researchers with expertise in the various branches of behavioral science, such as psychology, behavioral economics, and other aspects of brain science. The authors, one a computer scientist and the other a psychologist, have attempted over the past several years to understand the contributions that each approach to cybersecurity problems can benefit from this integrated approach that we have tended to call "behavioral cybersecurity." The authors believe that the research and curriculum approaches developed from this integrated approach provide a first book with this approach to cybersecurity. This book incorporates traditional technical computational and analytic approaches to cybersecurity, and also psychological and human factors approaches, as well. Features Discusses profiling approaches and risk management Includes case studies of major cybersecurity events and "Fake News" Presents analyses of password attacks and defenses Addresses game theory, behavioral economics and their application to cybersecurity Supplies research into attacker/defender personality and motivation traits Techniques for measuring cyber attacks/defenses using crypto and stego


Book
Successful cybersecurity professionals : how to change your behavior to protect your organization
Author:
ISBN: 1952538432 Year: 2020 Publisher: New York, New York : Business Expert Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Social engineering penetration testing : executing social engineering pen tests, assessments and defense
Authors: --- ---
ISBN: 0124201822 0124201245 1306642329 9780124201828 Year: 2014 Publisher: Waltham, Massachusetts ; Oxford, England : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Social engineering attacks target the weakest link in an organization's security-human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques-including email phishing, telephone pretexting, and physical vectors- can be used to elicit information or manipulate individuals into performing actions that

Listing 1 - 10 of 58 << page
of 6
>>
Sort by