Check nearby libraries
Buy this book
No matter how sophisticated your security equipment and procedures may be, their most, easily exploitable aspect is, and has always been, the human infrastructure. The skilled malicious social engineer is a weapon, nearly impossible to defend against.
This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Check nearby libraries
Buy this book
Previews available in: English
Edition | Availability |
---|---|
1
Social Engineering: The Science of Human Hacking
2018, Wiley & Sons, Incorporated, John
in English
1119433738 9781119433736
|
zzzz
|
2
Social Engineering: The science of human hacking
2018, Wiley
in English
- 2nd Edition
111943338X 9781119433385
|
eeee
|
3
Social Engineering: The Science of Human Hacking
2018, Wiley & Sons, Incorporated, John
in English
1119433754 9781119433750
|
zzzz
|
4
Social Engineering: The Science of Human Hacking
2018, Wiley & Sons, Limited, John
in English
111943372X 9781119433729
|
zzzz
|
5 |
zzzz
|
6
Social Engineering: The Art of Human Hacking
2011, Wiley, John Wiley [distributor]
Paperback
in English
0470639539 9780470639535
|
aaaa
|
7
Social Engineering: The Art of Human Hacking
Publish date unknown, Wiley Publishing
eBook
in English
1118029747 9781118029749
|
zzzz
|
Book Details
Table of Contents
Edition Notes
Includes index.
Classifications
Contributors
The Physical Object
Edition Identifiers
Work Identifiers
Source records
Library of Congress MARC recordInternet Archive item record
marc_openlibraries_sanfranciscopubliclibrary MARC record
Library of Congress MARC record
Better World Books record
Promise Item
marc_nuls MARC record
Promise Item
harvard_bibliographic_metadata record
Work Description
Examines what social engineering is, the methods used by hackers to gather information, and ways to prevent social engineering threats.
Links outside Open Library
Community Reviews (0)
December 27, 2023 | Edited by Drini | Add IA id |
December 11, 2023 | Edited by Drini | Merge works |
December 11, 2023 | Edited by Drini | Update covers |
October 18, 2022 | Edited by ImportBot | import existing book |
February 8, 2012 | Created by LC Bot | import new book |