From elicitation, pretexting, influence and manipulation allaspects of social engineering are picked apart, discussed andexplained by using real world examples, personal experience and thescience behind them to unraveled the mystery in socialengineering.
Kevin Mitnick—one of the most famous social engineers inthe world—popularized the term “socialengineering.” He explained that it is much easier to tricksomeone into revealing a password for a system than to exert theeffort of hacking into the system. Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.
Social Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers—now you can doyour part by putting to good use the critical information withinits pages.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Discover the secrets of expert con men and humanhackers
No matter how sophisticated your security equipment andprocedures may be, their most easily exploitable aspect is, and hasalways been, the human infrastructure. The skilled, malicioussocial engineer is a weapon, nearly impossible to defendagainst.
This book covers, in detail, the world's first framework forsocial engineering. It defines, explains, and dissects eachprinciple, then illustrates it with true stories and case studiesfrom masters such as Kevin Mitnick, renowned author of The Art ofDeception. You will discover just what it takes to excel as asocial engineer. Then you will know your enemy.
Tour the Dark World of Social Engineering
Learn the psychological principles employed by social engineersand how they're used
Discover persuasion secrets that social engineers know well
See how the crafty crook takes advantage of cameras, GPSdevices, and caller ID
Find out what information is, unbelievably, available online
Study real-world social engineering exploits step by step
"Most malware and client-side attacks have a social engineeringcomponent to deceive the user into letting the bad guys in. You canpatch technical vulnerabilities as they evolve, but there is nopatch for stupidity, or rather gullibility. Chris will show you howit's done by revealing the social engineering vectors used bytoday's intruders. His book will help you gain better insight onhow to recognize these types of attacks."
—Kevin Mitnick, Author, Speaker, and Consultant
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Spese di spedizione:
EUR 3,70
In U.S.A.
Descrizione libro Paperback. Condizione: new. New. Fast Shipping and good customer service. Codice articolo Holz_New_0470639539
Descrizione libro Condizione: new. Codice articolo Hafa_fresh_0470639539
Descrizione libro Paperback. Condizione: new. New Copy. Customer Service Guaranteed. Codice articolo think0470639539
Descrizione libro Paperback. Condizione: new. Brand New Copy. Codice articolo BBB_new0470639539
Descrizione libro Paperback. Condizione: new. New. Codice articolo Wizard0470639539
Descrizione libro Condizione: New. The item is Brand New!. Codice articolo 570Q1Y002H7G_ns
Descrizione libro Paperback. Condizione: new. Prompt service guaranteed. Codice articolo Clean0470639539
Descrizione libro Paperback. Condizione: new. Buy for Great customer experience. Codice articolo GoldenDragon0470639539
Descrizione libro Condizione: new. Codice articolo newMercantile_0470639539
Descrizione libro Condizione: new. Codice articolo FrontCover0470639539