Picture 1 of 1

Gallery
Picture 1 of 1

Have one to sell?
Social Engineering: The Art of Human Hacking by Christopher Hadnagy: Used
US $12.85
Condition:
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Shipping:
Free Standard Shipping.
Located in: Sparks, Nevada, United States
Delivery:
Estimated between Tue, Dec 2 and Sat, Dec 6 to 94104
Returns:
30 days returns. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Payments:
Special financing available. See terms and apply now- for PayPal Credit, opens in a new window or tab
Earn up to 5x points when you use your eBay Mastercard®. Learn moreabout earning points with eBay Mastercard
Shop with confidence
About this item
Seller assumes all responsibility for this listing.
eBay item number:364287443213
Item specifics
- Condition
- Book Title
- Social Engineering: The Art of Human Hacking
- Publication Date
- 2010-12-21
- Pages
- 382
- ISBN
- 9780470639535
- Subject Area
- Computers, Social Science
- Publication Name
- Social Engineering : the Art of Human Hacking
- Publisher
- Wiley & Sons, Incorporated, John
- Item Length
- 9 in
- Subject
- Sociology / General, Security / General, Social Aspects / Human-Computer Interaction
- Publication Year
- 2010
- Type
- Textbook
- Format
- Trade Paperback
- Language
- English
- Item Height
- 0.8 in
- Item Weight
- 17.4 Oz
- Item Width
- 6.1 in
- Number of Pages
- 416 Pages
About this product
Product Identifiers
Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0470639539
ISBN-13
9780470639535
eBay Product ID (ePID)
92367250
Product Key Features
Number of Pages
416 Pages
Language
English
Publication Name
Social Engineering : the Art of Human Hacking
Subject
Sociology / General, Security / General, Social Aspects / Human-Computer Interaction
Publication Year
2010
Type
Textbook
Subject Area
Computers, Social Science
Format
Trade Paperback
Dimensions
Item Height
0.8 in
Item Weight
17.4 Oz
Item Length
9 in
Item Width
6.1 in
Additional Product Features
Intended Audience
Trade
LCCN
2010-937817
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Foreword xiii Preface and Acknowledgments xvii 1 A Look into the World of Social Engineering 1 Why This Book Is So Valuable 3 Overview of Social Engineering 9 Summary 21 2 Information Gathering 23 Gathering Information 26 Sources for Information Gathering 33 Communication Modeling 43 The Power of Communication Models 53 3 Elicitation 55 What Is Elicitation? 56 The Goals of Elicitation 58 Mastering Elicitation 74 Summary 76 4 Pretexting: How to Become Anyone 77 What Is Pretexting? 78 The Principles and Planning Stages of Pretexting 79 Successful Pretexting 91 Summary 99 5 Mind Tricks: Psychological Principles Used in Social Engineering 101 Modes of Thinking 103 Microexpressions 109 Neurolinguistic Programming (NLP) 136 Interview and Interrogation 143 Building Instant Rapport 162 The Human Buffer Overflow 172 Summary 178 6 Influence: The Power of Persuasion 181 The Five Fundamentals of Influence and Persuasion 182 Influence Tactics 187 Altering Reality: Framing 215 Manipulation: Controlling Your Target 233 Manipulation in Social Engineering 248 Summary 256 7 The Tools of the Social Engineer 259 Physical Tools 260 Online Information-Gathering Tools 279 Summary 297 8 Case Studies: Dissecting the Social Engineer 299 Mitnick Case Study 1: Hacking the DMV 300 Mitnick Case Study 2: Hacking the Social Security Administration 306 Hadnagy Case Study 1: The Overconfident CEO 310 Hadnagy Case Study 2: The Theme Park Scandal 317 Top-Secret Case Study 1: Mission Not Impossible 322 Top-Secret Case Study 2: Social Engineering a Hacker 329 Why Case Studies Are Important 337 Summary 338 9 Prevention and Mitigation 339 Learning to Identify Social Engineering Attacks 340 Creating a Personal Security Awareness Culture 341 Being Aware of the Value of the Information You Are Being Asked For 344 Keeping Software Updated 347 Developing Scripts 348 Learning from Social Engineering Audits 348 Concluding Remarks 354 Summary 361 Index 363
Synopsis
The first book to reveal and dissect the technical aspect ofmany social engineering maneuvers From elicitation, pretexting, influence and manipulation allaspects of social engineering are picked apart, discussed andexplained by using real world examples, personal experience and thescience behind them to unraveled the mystery in socialengineering. Kevin Mitnick--one of the most famous social engineers inthe world--popularized the term "socialengineering." He explained that it is much easier to tricksomeone into revealing a password for a system than to exert theeffort of hacking into the system. Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats. Examines social engineering, the science of influencing atarget to perform a desired task or divulge information Arms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem access Reveals vital steps for preventing social engineeringthreats Social Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers--now you can doyour part by putting to good use the critical information withinits pages., The first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Kevin Mitnick'one of the most famous social engineers in the world'popularized the term ?social engineering.' He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats. Examines social engineering, the science of influencing a target to perform a desired task or divulge information Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access Reveals vital steps for preventing social engineering threats Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers'now you can do your part by putting to good use the critical information within its pages., "Chris Hadnagy has penned the ultimate text on social engineering. Meticulously researched and teeming with practical applications, this brilliant book offers solutions to very real problems and ever-present dangers to your business and even to yourself. Truly groundbreaking." Kevin Hogan , author of The Science of Influence: How to Get Anyone to Say "Yes" in 8 Minutes or Less Discover the secrets of expert con men and human hackers No matter how sophisticated your security equipment and procedures may be, their most easily exploitable aspect is, and has always been, the human infrastructure. The skilled, malicious social engineer is a weapon, nearly impossible to defend against. This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy. Tour the Dark World of Social Engineering Learn the psychological principles employed by social engineers and how they're used Discover persuasion secrets that social engineers know well See how the crafty crook takes advantage of cameras, GPS devices, and caller ID Find out what information is, unbelievably, available online Study real-world social engineering exploits step by step "Most malware and client-side attacks have a social engineering component to deceive the user into letting the bad guys in. You can patch technical vulnerabilities as they evolve, but there is no patch for stupidity, or rather gullibility. Chris will show you how it's done by revealing the social engineering vectors used by today's intruders. His book will help you gain better insight on how to recognize these types of attacks." Kevin Mitnick , Author, Speaker, and Consultant
LC Classification Number
QA76.9.A25
Item description from the seller
Seller feedback (555,226)
- r***g (243)- Feedback left by buyer.Past monthVerified purchaseBook was "nearly new" and "as described" in listing. The advertised price was fair and a good value. Unfortunately, the seller's shipping partner was very slow to get the book packaged and shipped. Shipping took too long, and the tracking info gave no reliable info on shipping date, time in transit or expected delivery. Seller did everything right, but their shipping partner needs improvement. I recommend this seller to other eBay buyers....... just make sure you're okay with the shipping terms.
- e***u (283)- Feedback left by buyer.Past 6 monthsVerified purchaseThe listing was for a hardcover version of this book; however, I received a paperback. The Seller replied quickly to my question about this issue and issued a full refund - and let me keep the book. So, a diligent Seller for sure - and well packaged and reasonable timing on shipping. Thank you for the refund, and as you suggested, I'll likely donate this volume and seek the hardcover.
- a***a (419)- Feedback left by buyer.Past monthVerified purchaseThis 2DVD set is in perfect condition. Cover art and case like new. Both DVDs played with no flaws. Description was listed as “Good”; I would describe it as “Very Good”, basically Like New. Delivery was super fast and packaging was excellent. The DVD case was wrapped well, then put in a cardboard envelope that was sturdy and hard to open (this is NOT a negative!). I have purchased from this company a few times and have always been very satisfied. Prices are great.
Product ratings and reviews
Most relevant reviews
- May 29, 2020
Thank you very much
Verified purchase: YesCondition: Pre-OwnedSold by: juscul_75
- Apr 12, 2016
easy to understand
Verified purchase: YesCondition: NewSold by: big_river_books
More to explore :
- Art & Culture Nonfiction Social Sciences Fiction & Nonfiction Books,
- American (US) Fraternal, Social Organizations Antiquarian & Collectible Books,
- Social Psychology Textbooks,
- Fiction Books & Christopher Pike Fiction,
- Psychology Social Psychology Textbooks,
- Nonfiction Books Fiction & Social Issues,
- Fiction Books & Matt Christopher Fiction,
- Social Sciences Nonfiction Books & Fiction,
- Fiction Books & Christopher Moore Fiction,
- Christopher Pike Fantasy Fiction Fiction & Books

