Catalog

Record Details

Catalog Search



Social engineering : the art of human hacking  Cover Image Book Book

Social engineering : the art of human hacking / by Christopher Hadnagy.

Record details

  • ISBN: 9780470639535 (pbk.)
  • ISBN: 0470639539 (pbk.)
  • Physical Description: xix, 382 p. : ill. ; 23 cm.
  • Publisher: Hoboken, N.J. : Wiley ; 2011.

Content descriptions

General Note:
Includes index.
Formatted Contents Note:
A look into the world of social engineering -- Information gathering -- Elicitation -- Pretexting: how to become anyone -- Mind tricks: psychological principles used in social engineering -- Influence: the power of persuasion -- The tools of the social engineer -- Case studies: dissecting the social engineer -- Prevention and mitigation.
Subject: Social engineering.
Computer hackers.
Computer security.
Human-computer interaction.

Available copies

Holds

  • 0 current holds with 1 total copy.
Show Only Available Copies
Location Call Number / Copy Notes Barcode Shelving Location Status Due Date
Coldwater Branch 005.8 HAD (Text) 35401424801867 Non-Fiction Available -

Syndetic Solutions - Table of Contents for ISBN Number 9780470639535
Social Engineering : The Art of Human Hacking
Social Engineering : The Art of Human Hacking
by Hadnagy, Christopher; Wilson, Paul (Foreword by)
Rate this title:
vote data
Click an element below to view details:

Table of Contents

Social Engineering : The Art of Human Hacking

SectionSection DescriptionPage Number
Forewordp. xiii
Preface and Acknowledgmentsp. xvii
1A Look into the World of Social Engineeringp. 1
    Why This Book Is So Valuablep. 3
    Overview of Social Engineeringp. 9
    Summaryp. 21
2Information Gatheringp. 23
    Gathering Informationp. 26
    Sources for Information Gatheringp. 33
    Communication Modelingp. 43
    The Power of Communication Modelsp. 53
3Eficitationp. 55
    What Is Elicitation?p. 56
    The Goals of Elicitationp. 58
    Mastering Elicitationp. 74
    Summaryp. 76
4Pretexting: How to Become Anyonep. 77
    What Is Pretexting?p. 78
    The Principles and Planning Stages of Pretextingp. 79
    Successful Pretextingp. 91
    Summaryp. 99
5Mind Tricks: Psychological Principles Used in Social Engineeringp. 101
    Modes of Thinking
    Microexpressionsp. 109
    Neurolinguistic Programming (NLP)p. 136
    Interview and Interrogationp. 143
    Building Instant Rapportp. 162
    The Human Buffer Overflowp. 172
    Summaryp. 178
6Influence: The Power of Persuasionp. 181
    The Five Fundamentals of Influence and Persuasionp. 182
    Influence Tacticsp. 187
    Altering Reality: Framingp. 215
    Manipulation: Controlling Your Targetp. 233
    Manipulation in Social Engineeringp. 248
    Summaryp. 256
7The Tools of the Social Engineerp. 259
    Physical Toolsp. 260
    Online Information-Gathering Toolsp. 279
    Summaryp. 297
8Case Studies: Dissecting the Social Engineerp. 299
    Mitnick Case Study 1: Hacking the DMVp. 300
    Mitnick Case Study 2: Hacking the Social Security Administrationp. 306
    Hadnagy Case Study 1: The Overconfident CEOp. 310
    Hadnagy Case Study 2: The Theme Park Scandalp. 317
    Top-Secret Case Study 1: Mission Not Impossiblep. 322
    Top-Secret Case Study 2: Social Engineering a Hackerp. 329
    Why Case Studies Are Importantp. 337
    Summaryp. 338
9Prevention and Mitigationp. 339
    Learning to Identify Social Engineering Attacksp. 340
    Creating a Personal Security Awareness Culturep. 341
    Being Aware of the Value of the Information You Are Being Asked Forp. 344
    Keeping Software Updatedp. 347
    Developing Scriptsp. 348
    Learning from Social Engineering Auditsp. 348
    Concluding Remarksp. 354
    Summaryp. 361
Indexp. 363

Additional Resources