Sign up
Forgot password?
FAQ: Login

Recent files

Hexcode Publishing, 2014 — 125 p. Introduction to social engineering. Influencing techniques. Elicitation. Pretexting. Information gathering. Tools. The playbook. Resources.
  • 7,47 MB
  • added
  • info modified

John Wiley & Sons Limited, 2014. — 168 p. — ISBN13: 978-1-118-60857-9. Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of...
  • 13,94 MB
  • added
  • info modified
John Wiley & Sons Limited, 2014. — 168 p. — ISBN13: 978-1-118-60857-9. Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of...
  • 13,88 MB
  • added
  • info modified
John Wiley & Sons Limited, 2014. — 168 p. — ISBN13: 978-1-118-60857-9. Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of...
  • 13,92 MB
  • added
  • info modified
John Wiley & Sons Limited, 2014. — 258 p. — ISBN13: 978-1-118-60857-9. Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of...
  • 2,59 MB
  • added
  • info modified
John Wiley & Sons Limited, 2014. — 258 p. — ISBN13: 978-1-118-60857-9. Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of...
  • 43,61 MB
  • added
  • info modified

Wiley, 2010 — 416 p. From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Kevin Mitnick — one of the most famous social engineers in the world — popularized the term social...
  • 6,03 MB
  • added
  • info modified

2018. — 118 p. — ISBN: 1723833274. If you ever wanted to build a virtual lab, get started with Social Engineering, this book is perfect for you! Have you ever wondered how social engineers get their hands on information like password, usernames and other credentials? In this book you'll learn: How to build a virtual labHow to install Kali Linux as a virtual machineHow to...
  • 5,69 MB
  • added
  • info modified
2018. — 118 p. — ISBN: 1723833274. If you ever wanted to build a virtual lab, get started with Social Engineering, this book is perfect for you! Have you ever wondered how social engineers get their hands on information like password, usernames and other credentials? In this book you'll learn: How to build a virtual labHow to install Kali Linux as a virtual machineHow to...
  • 2,93 MB
  • added
  • info modified

Wiley, 2018. — 320 p. Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire — why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most...
  • 6,41 MB
  • added
  • info modified
Wiley, 2018. — 320 p. Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire — why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most...
  • 5,31 MB
  • added
  • info modified

2nd Edition. — Wiley, 2018. — 309 p. — ISBN: 978-1-119-43338-5. Harden the human firewall against the most current threats This book reveals the craftier side of the hacker’s repertoire — why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in...
  • 10,37 MB
  • added
  • info modified

Wiley, 2011. — 416 p. — ISBN13: 978-0470639535. Social Engineering: The Art of Human Hacking From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Examines social engineering,...
  • 58,53 MB
  • added
  • info modified
Wiley, 2011. — 416 p. — ISBN13: 978-0470639535. Social Engineering: The Art of Human Hacking From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Examines social engineering,...
  • 40,30 MB
  • added
  • info modified
Wiley, 2011. — 416 p. — ISBN13: 978-0470639535. Social Engineering: The Art of Human Hacking From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Examines social engineering,...
  • 20,23 MB
  • added
  • info modified

Gover, 2008. — 267 p. Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of social engineering...
  • 1,55 MB
  • added
  • info modified

Wiley, 2010 — 416 p. From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Kevin Mitnick — one of the most famous social engineers in the world — popularized the term social...
  • 6,11 MB
  • added
  • info modified
Up