The Art of Human Hacking
From elicitation, pretexting, influence and manipulation allaspects of social engineering are picked apart, discussed andexplained by using real world examples, personal experience and thescience behind them to unraveled the mystery in socialengineering.
Kevin Mitnick—one of the most famous social engineers inthe world—popularized the term “socialengineering.” He explained that it is much easier to tricksomeone into revealing a password for a system than to exert theeffort of hacking into the system. Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.
- Examines social engineering, the science of influencing atarget to perform a desired task or divulge information
- Arms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem access
- Reveals vital steps for preventing social engineeringthreats
Social Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers—now you can doyour part by putting to good use the critical information withinits pages.
, or download in or
Title: Social Engineering
Author: Christopher Hadnagy; Paul Wilson
New Digital Storytelling, The: Creating Narratives with New Media 2011 US$ 49.00 296 pages
The Internet For Dummies 2015 US$ 19.99 388 pages
CompTIA A+ Certification All-in-One Exam Guide, 8th Edition (Exams 220-801 & 220-802) 2012 US$ 60.00 1664 pages
Beginning ASP.NET 4.5 in VB 2012 US$ 31.49 889 pages
- Academic > Computer Science > Computer science
- Academic > Computer Science > Electronic data processing
- Academic > Computer Science > Computers - special aspects
- Academic > Computer Science > System design; Periodicals
- Academic > Computer Science > Human-computer interaction
- Computers > Security
- Computers > Social Aspects