Hexcode Publishing, 2014 — 125 p. Introduction to social engineering. Influencing techniques. Elicitation. Pretexting. Information gathering. Tools. The playbook. Resources.
John Wiley & Sons Limited, 2014. — 168 p. — ISBN13: 978-1-118-60857-9. Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of...
John Wiley & Sons Limited, 2014. — 168 p. — ISBN13: 978-1-118-60857-9. Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of...
John Wiley & Sons Limited, 2014. — 168 p. — ISBN13: 978-1-118-60857-9. Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of...
John Wiley & Sons Limited, 2014. — 258 p. — ISBN13: 978-1-118-60857-9. Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of...
John Wiley & Sons Limited, 2014. — 258 p. — ISBN13: 978-1-118-60857-9. Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of...
Wiley, 2010 — 416 p. From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Kevin Mitnick — one of the most famous social engineers in the world — popularized the term social...
2018. — 118 p. — ISBN: 1723833274. If you ever wanted to build a virtual lab, get started with Social Engineering, this book is perfect for you! Have you ever wondered how social engineers get their hands on information like password, usernames and other credentials? In this book you'll learn: How to build a virtual labHow to install Kali Linux as a virtual machineHow to...
2018. — 118 p. — ISBN: 1723833274. If you ever wanted to build a virtual lab, get started with Social Engineering, this book is perfect for you! Have you ever wondered how social engineers get their hands on information like password, usernames and other credentials? In this book you'll learn: How to build a virtual labHow to install Kali Linux as a virtual machineHow to...
Wiley, 2018. — 320 p. Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire — why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most...
Wiley, 2018. — 320 p. Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire — why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most...
2nd Edition. — Wiley, 2018. — 309 p. — ISBN: 978-1-119-43338-5. Harden the human firewall against the most current threats This book reveals the craftier side of the hacker’s repertoire — why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in...
Wiley, 2011. — 416 p. — ISBN13: 978-0470639535. Social Engineering: The Art of Human Hacking From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Examines social engineering,...
Wiley, 2011. — 416 p. — ISBN13: 978-0470639535. Social Engineering: The Art of Human Hacking From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Examines social engineering,...
Wiley, 2011. — 416 p. — ISBN13: 978-0470639535. Social Engineering: The Art of Human Hacking From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Examines social engineering,...
Gover, 2008. — 267 p. Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of social engineering...
Wiley, 2010 — 416 p. From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Kevin Mitnick — one of the most famous social engineers in the world — popularized the term social...