Social Engineering: The Art of Human Hacking

  Social Engineering: The Art of Human Hacking
 

 By Christopher Hadnagy and Paul Wilson  

 

 

Description: 

 
From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.

Kevin Mitnick—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.  

 

Social Engineering; The Art of Human Hacking: 

 

Examines social engineering, the science of influencing a target to perform a desired task or divulge information

Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access

Reveals vital steps for preventing social engineering threats

 

Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers—now you can do your part by putting to good use the critical information within its pages.

 


 

Product Details:
Copyright 2010
ISBN 978-0-470-63953-5
Paperback, 408 Pages
John Wiley & Sons Publishing

Table of Contents:

 

Chapter 1: A Look into the World of Social Engineering

Chapter 2: Information Gathering

Chapter 3: Elicitation

Chapter 4: Pretexting: How to Become Anyone

Chapter 5: Mind Tricks: Psychological Principles Used in Social Engineering

Chapter 6: Influence: The Power of Persuasion

Chapter 7: The Tools of the Social Engineer

Chapter 8: Case Studies: Dissecting the Social Engineer

Chapter 9: Prevention and Mitigation