Skip to content
NxDeals.comNxDeals.com
  • Home
  • Products
    All Products
    2023 Calendar
    MUTEX Locks
    Mi Products
    Arts, Crafts & Sewing
    Baby Products
    Beauty & Personal Care
    Clothing, Shoes & Jewelry
    Electronics
    Grocery & Gourmet Food
    Health & Household
    Home & Kitchen
    Industrial & Scientific
    Movie & TV
    Musical Instruments
    Office Products
    Pet Supplies
    Sports & Outdoors
    Toys & Games
    Video Games
    Books
  • Login
  • Help
  • Wishlist
  • Cart / $0.00 0
    • No products in the cart.

  • 0

    Cart

    No products in the cart.

-20%
Add to wishlist
Home / Books / Computer Science

Social Engineering

$632.67 $506.14

  • Wiley Publishing

Out of stock

buy on amazon

Add to wishlist
EAN: 9780470639535 SKU: IMUSTI-978-0-470-63953-5 Categories: Computer Hacking, Computer History & Culture, Computer Science, Computer Security & Encryption
Recently Viewed
  • HANGERWORLD Natural Cedar Wooden Tie Scarf Belt Hanging Storage Organizer Hanger $57.75 $46.20
  • Another Late Night $103.89 $83.11
  • Description
  • Additional information
  • Reviews (0)
The first book to reveal and dissect the technical aspect of many social engineering maneuvers

From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.

Kevin Mitnick—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.

  • Examines social engineering, the science of influencing a target to perform a desired task or divulge information
  • Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access
  • Reveals vital steps for preventing social engineering threats

    Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers—now you can do your part by putting to good use the critical information within its pages.

    From the Author: Defining Neuro-Linguistic Hacking (NLH)
    Author Chris Hadnagy NLH is a combination of the use of key parts of neuro-lingusitic programming, the functionality of microexpressions, body language, gestures and blend it all together to understand how to “hack” the human infrastructure. Let’s take a closer at each to see how it applies.

    Neuro-Lingusitic Programming (NLP): NLP is a controversial approach to psychotherapy and organizational change based on “a model of interpersonal communication chiefly concerned with the relationship between successful patterns of behavior and the subjective experiences underlying them” and “a system of alternative therapy based on this which seeks to educate people in self-awareness and effective communication, and to change their patterns of mental and emotional behavior”

    Neuro: This points to our nervous system which we process our five senses:
    • Visual
    • Auditory
    • Kinesthetic
    • Smell
    • Taste

    Linguistic: This points to how we use language and other nonverbal communication systems through which our neural representations are coded, ordered and given meaning. This can include things like:
    • Pictures
    • Sounds
    • Feelings
    • Tastes
    • Smells
    • Words

    Programming: This is our ability to discover and utilize the programs that we run in our neurological systems to achieve our specific and desired outcomes.

    In short, NLP is how to use the language of the mind to consistently achieve, modify and alter our specific and desired outcomes (or that of a target).

    Microexpressions are the involuntary muscular reactions to emotions we feel. As the brain processes emotions it causes nerves to constrict certain muscle groups in the face. Those reactions can last from 1/25th of a second to 1 second and reveal a person’s true emotions.

    Much study has been done on microexpressions as well as what is being labeled as subtle microexpressions. A subtle microexpression is an important part of NLH training as a social engineer as many people will display subtle hints of these expressions and give you clues as to their feelings.

Editorial Reviews

From the Inside Flap

Forward written by Paul Wilson from The Real Hustle UK. 
rpaulwilson.com/

From the Back Cover

“Chris Hadnagy has penned the ultimate text on social engineering.Meticulously researched and teeming with practical applications,this brilliant book offers solutions to very real problems andever-present dangers to your business — and even to yourself.Truly groundbreaking.”
—
Kevin Hogan, author of The Science of Influence:How to Get Anyone to Say “Yes” in 8 Minutes or Less

Discover the secrets of expert con men and humanhackers

No matter how sophisticated your security equipment andprocedures may be, their most easily exploitable aspect is, and hasalways been, the human infrastructure. The skilled, malicioussocial engineer is a weapon, nearly impossible to defendagainst.

This book covers, in detail, the world’s first framework forsocial engineering. It defines, explains, and dissects eachprinciple, then illustrates it with true stories and case studiesfrom masters such as Kevin Mitnick, renowned author of The Art ofDeception. You will discover just what it takes to excel as asocial engineer. Then you will know your enemy.

Tour the Dark World of Social Engineering

  • Learn the psychological principles employed by social engineersand how they’re used

  • Discover persuasion secrets that social engineers know well

  • See how the crafty crook takes advantage of cameras, GPSdevices, and caller ID

  • Find out what information is, unbelievably, available online

  • Study real-world social engineering exploits step by step

“Most malware and client-side attacks have a social engineeringcomponent to deceive the user into letting the bad guys in. You canpatch technical vulnerabilities as they evolve, but there is nopatch for stupidity, or rather gullibility. Chris will show you howit’s done by revealing the social engineering vectors used bytoday’s intruders. His book will help you gain better insight onhow to recognize these types of attacks.”
—
Kevin Mitnick, Author, Speaker, and Consultant

About the Author

Christopher Hadnagy is the lead developer of www.social-engineer.org, the world’s first social engineering framework. In more than 14 years of security and IT activity, he has partnered with the team at www.backtrack-linux.org and worked on a wide variety of security projects. He also serves as trainer and lead social engineer for Offensive Security’s penetration testing team.

Product information

PartNumber 978-0-470-63953-5 Manufacturer John Wiley &Sons
Brand imusti Author Hadnagy, Christopher
NumberOfItems 1 Item Weight 1.08 Pounds
ItemDimensions 6 x 0.93 x 9Inches ReleaseDate 2010-12-21T00:00:01Z
binding Paperback Amazon Category Books » Computers & Technology » Internet & Social Media » Computer Hacking
Amazon Category Books » Computers & Technology » Computer Security & Encryption Amazon Category Books » Computers & Technology » Computer History & Culture
Amazon Category Books » Specialty Boutique » Textbooks » Computer Science EAN 8601404717680
EAN 8601300286532 EAN 0884812796562
EAN 9780470639535 UPC 884812796562
ISBN 0470639539 ISBN 9780470639535
Weight 1.08 lbs

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Related Products

-13%
Add to wishlist
Quick View

Business Management

Cyber Security Essentials

$80.11 $69.66
Compare Products
-13%
Add to wishlist
Quick View

Business & Finance

Mechanics of User Identification and Authentication: Fundamentals of Identity Management

$204.88 $178.16
Compare Products
  • About us
  • Contact Us
  • Privacy Policy
  • Refund and Returns Policy
  • Terms Of Service
Copyright 2025 © NxDeals
  • Home
  • Products
    • Mutex locks
    • Mi Products
    • Arts, Crafts & Sewing
    • Baby Products
    • Beauty & Personal Care
    • Books
    • Clothing, Shoes & Jewelry
    • Electronics
    • Grocery & Gourmet Food
    • Health & Household
    • Home & Kitchen
    • Industrial & Scientific
    • Musical Instruments
    • Office Products
    • Pet Supplies
    • Sports & Outdoors
    • Toys & Games
    • Video Games
  • Login

We are Official MUTEX Locks North America Distributor. Dismiss

Login

Lost your password?