This item is out of stock.

Social Engineering: The Art of Human Hacking by Christopher Hadnagy: Used

US $12.85
Condition:
Good
Shipping:
Free Standard Shipping.
Located in: Sparks, Nevada, United States
Delivery:
Estimated between Tue, Dec 2 and Sat, Dec 6 to 94104
Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the shipping service selected, the seller's shipping history, and other factors. Delivery times may vary, especially during peak periods.
Returns:
30 days returns. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Payments:
       Diners Club
Earn up to 5x points when you use your eBay Mastercard®. Learn moreabout earning points with eBay Mastercard

Shop with confidence

eBay Money Back Guarantee
Get the item you ordered or your money back. Learn moreeBay Money Back Guarantee - opens new window or tab
Seller assumes all responsibility for this listing.
eBay item number:364287443213
Last updated on Nov 23, 2025 14:48:27 PSTView all revisionsView all revisions

Item specifics

Condition
Good: A book that has been read but is in good condition. Very minimal damage to the cover including ...
Book Title
Social Engineering: The Art of Human Hacking
Publication Date
2010-12-21
Pages
382
ISBN
9780470639535
Subject Area
Computers, Social Science
Publication Name
Social Engineering : the Art of Human Hacking
Publisher
Wiley & Sons, Incorporated, John
Item Length
9 in
Subject
Sociology / General, Security / General, Social Aspects / Human-Computer Interaction
Publication Year
2010
Type
Textbook
Format
Trade Paperback
Language
English
Item Height
0.8 in
Author
Christopher Hadnagy
Item Weight
17.4 Oz
Item Width
6.1 in
Number of Pages
416 Pages
Category

About this product

Product Identifiers

Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0470639539
ISBN-13
9780470639535
eBay Product ID (ePID)
92367250

Product Key Features

Number of Pages
416 Pages
Language
English
Publication Name
Social Engineering : the Art of Human Hacking
Subject
Sociology / General, Security / General, Social Aspects / Human-Computer Interaction
Publication Year
2010
Type
Textbook
Subject Area
Computers, Social Science
Author
Christopher Hadnagy
Format
Trade Paperback

Dimensions

Item Height
0.8 in
Item Weight
17.4 Oz
Item Length
9 in
Item Width
6.1 in

Additional Product Features

Intended Audience
Trade
LCCN
2010-937817
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Foreword xiii Preface and Acknowledgments xvii 1 A Look into the World of Social Engineering 1 Why This Book Is So Valuable 3 Overview of Social Engineering 9 Summary 21 2 Information Gathering 23 Gathering Information 26 Sources for Information Gathering 33 Communication Modeling 43 The Power of Communication Models 53 3 Elicitation 55 What Is Elicitation? 56 The Goals of Elicitation 58 Mastering Elicitation 74 Summary 76 4 Pretexting: How to Become Anyone 77 What Is Pretexting? 78 The Principles and Planning Stages of Pretexting 79 Successful Pretexting 91 Summary 99 5 Mind Tricks: Psychological Principles Used in Social Engineering 101 Modes of Thinking 103 Microexpressions 109 Neurolinguistic Programming (NLP) 136 Interview and Interrogation 143 Building Instant Rapport 162 The Human Buffer Overflow 172 Summary 178 6 Influence: The Power of Persuasion 181 The Five Fundamentals of Influence and Persuasion 182 Influence Tactics 187 Altering Reality: Framing 215 Manipulation: Controlling Your Target 233 Manipulation in Social Engineering 248 Summary 256 7 The Tools of the Social Engineer 259 Physical Tools 260 Online Information-Gathering Tools 279 Summary 297 8 Case Studies: Dissecting the Social Engineer 299 Mitnick Case Study 1: Hacking the DMV 300 Mitnick Case Study 2: Hacking the Social Security Administration 306 Hadnagy Case Study 1: The Overconfident CEO 310 Hadnagy Case Study 2: The Theme Park Scandal 317 Top-Secret Case Study 1: Mission Not Impossible 322 Top-Secret Case Study 2: Social Engineering a Hacker 329 Why Case Studies Are Important 337 Summary 338 9 Prevention and Mitigation 339 Learning to Identify Social Engineering Attacks 340 Creating a Personal Security Awareness Culture 341 Being Aware of the Value of the Information You Are Being Asked For 344 Keeping Software Updated 347 Developing Scripts 348 Learning from Social Engineering Audits 348 Concluding Remarks 354 Summary 361 Index 363
Synopsis
The first book to reveal and dissect the technical aspect ofmany social engineering maneuvers From elicitation, pretexting, influence and manipulation allaspects of social engineering are picked apart, discussed andexplained by using real world examples, personal experience and thescience behind them to unraveled the mystery in socialengineering. Kevin Mitnick--one of the most famous social engineers inthe world--popularized the term "socialengineering." He explained that it is much easier to tricksomeone into revealing a password for a system than to exert theeffort of hacking into the system. Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats. Examines social engineering, the science of influencing atarget to perform a desired task or divulge information Arms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem access Reveals vital steps for preventing social engineeringthreats Social Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers--now you can doyour part by putting to good use the critical information withinits pages., The first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Kevin Mitnick'one of the most famous social engineers in the world'popularized the term ?social engineering.' He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats. Examines social engineering, the science of influencing a target to perform a desired task or divulge information Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access Reveals vital steps for preventing social engineering threats Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers'now you can do your part by putting to good use the critical information within its pages., "Chris Hadnagy has penned the ultimate text on social engineering. Meticulously researched and teeming with practical applications, this brilliant book offers solutions to very real problems and ever-present dangers to your business and even to yourself. Truly groundbreaking." Kevin Hogan , author of The Science of Influence: How to Get Anyone to Say "Yes" in 8 Minutes or Less Discover the secrets of expert con men and human hackers No matter how sophisticated your security equipment and procedures may be, their most easily exploitable aspect is, and has always been, the human infrastructure. The skilled, malicious social engineer is a weapon, nearly impossible to defend against. This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy. Tour the Dark World of Social Engineering Learn the psychological principles employed by social engineers and how they're used Discover persuasion secrets that social engineers know well See how the crafty crook takes advantage of cameras, GPS devices, and caller ID Find out what information is, unbelievably, available online Study real-world social engineering exploits step by step "Most malware and client-side attacks have a social engineering component to deceive the user into letting the bad guys in. You can patch technical vulnerabilities as they evolve, but there is no patch for stupidity, or rather gullibility. Chris will show you how it's done by revealing the social engineering vectors used by today's intruders. His book will help you gain better insight on how to recognize these types of attacks." Kevin Mitnick , Author, Speaker, and Consultant
LC Classification Number
QA76.9.A25

Item description from the seller

About this seller

AlibrisBooks

99.1% positive feedback2.0M items sold

Joined May 2008
Usually responds within 24 hours
Alibris is the premier online marketplace for independent sellers of new & used books, as well as rare & collectible titles. We connect people who love books to thousands of independent sellers around ...
See more

Detailed seller ratings

Average for the last 12 months
Accurate description
4.9
Reasonable shipping cost
5.0
Shipping speed
5.0
Communication
5.0

Seller feedback (555,226)

All ratingsselected
Positive
Neutral
Negative
  • r***g (243)- Feedback left by buyer.
    Past month
    Verified purchase
    Book was "nearly new" and "as described" in listing. The advertised price was fair and a good value. Unfortunately, the seller's shipping partner was very slow to get the book packaged and shipped. Shipping took too long, and the tracking info gave no reliable info on shipping date, time in transit or expected delivery. Seller did everything right, but their shipping partner needs improvement. I recommend this seller to other eBay buyers....... just make sure you're okay with the shipping terms.
  • e***u (283)- Feedback left by buyer.
    Past 6 months
    Verified purchase
    The listing was for a hardcover version of this book; however, I received a paperback. The Seller replied quickly to my question about this issue and issued a full refund - and let me keep the book. So, a diligent Seller for sure - and well packaged and reasonable timing on shipping. Thank you for the refund, and as you suggested, I'll likely donate this volume and seek the hardcover.
  • a***a (419)- Feedback left by buyer.
    Past month
    Verified purchase
    This 2DVD set is in perfect condition. Cover art and case like new. Both DVDs played with no flaws. Description was listed as “Good”; I would describe it as “Very Good”, basically Like New. Delivery was super fast and packaging was excellent. The DVD case was wrapped well, then put in a cardboard envelope that was sturdy and hard to open (this is NOT a negative!). I have purchased from this company a few times and have always been very satisfied. Prices are great.

Product ratings and reviews

5.0
2 product ratings
  • 2 users rated this 5 out of 5 stars
  • 0 users rated this 4 out of 5 stars
  • 0 users rated this 3 out of 5 stars
  • 0 users rated this 2 out of 5 stars
  • 0 users rated this 1 out of 5 stars

Would recommend

Good value

Compelling content

Most relevant reviews

  • Thank you very much

    Awesome! thank you :D

    Verified purchase: YesCondition: Pre-OwnedSold by: juscul_75

  • easy to understand

    Verified purchase: YesCondition: NewSold by: big_river_books