4.3(21)

Social Engineering : The Science of Human Hacking 2nd Edition

Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest.

Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks.

Starten Sie noch heute mit diesem Buch für CHF 0

  • Hol dir während der Probezeit vollen Zugriff auf alle Bücher in der App
  • Keine Verpflichtungen, du kannst jederzeit kündigen
Jetzt kostenlos testen
Mehr als 52 000 Menschen haben Nextory im App Store und auf Google Play 5 Sterne gegeben.

Andere haben auch gelesen

Liste überspringen
  1. Kali Linux Essentials : Definitive Reference for Developers and Engineers

    Richard Johnson

  2. Kali Linux Cookbook : Over 70 recipes to help you master Kali Linux for effective penetration security testing

    Willie L. Pritchett, David De Smet

  3. 3.0

    Mind Hacking Secrets : How to Overcome Self-Sabotaging Thinking, Master Your Focus and Live a Successful and Positive Life on Your Own Terms

    Jay Laurson

  4. 3.0

    Coding Democracy : How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age

    Maureen Webb

  5. 4.4

    In the Blood : James Reece 5

    Jack Carr

  6. 4.5

    The Pentester BluePrint : Starting a Career as an Ethical Hacker

    Phillip L. Wylie, Kim Crawley

  7. Reconnaissance for Ethical Hackers : Focus on the starting point of data breaches and explore essential steps for successful pentesting

    Glen D. Singh

  8. The Grizzly Steppe Report (Unmasking the Russian Cyber Activity) : Official Joint Analysis Report: Tools and Hacking Techniques Used to Interfere the U.S. Elections

    U.S. Department of Homeland Security, Federal Bureau of Investigation

  9. Hacking Marketing : The Ultimate Guide to Online Marketing Secrets, Learn How to Use Social Networking For Marketing and The Internet Marketing Mistakes You Need to Avoid

    Gregory Lawson

  10. 4.5

    The Day After Roswell

    William J Birnes, Philip Corso

  11. 4.2

    Mind Hacking : How to Change Your Mind, Become a Master of Your Emotions, Achieve the Goals You Want, & Start Living to Your Full Potential

    Tiffany Adams

  12. 4.0

    Brain Apps : Hacking Neuroscience to Get There

    Robert G. Best, J. M. Best