- Paperback: 416 pages
- Publisher: Wiley; 1 edition (December 21, 2010)
- Language: English
- ISBN-10: 0470639539
- ISBN-13: 978-0470639535
- Product Dimensions: 5.9 x 1.1 x 8.9 inches
- Shipping Weight: 1.1 pounds (View shipping rates and policies)
- Average Customer Review: 4.2 out of 5 stars See all reviews (170 customer reviews)
- Amazon Best Sellers Rank: #34,629 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Social Engineering: The Art of Human Hacking 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
Frequently bought together
Customers who bought this item also bought
From the Publisher
|Social Engineering: The Art of Human Hacking||Unmasking the Social Engineer: The Human Element of Security||Social Engineering and Nonverbal Behavior Set||Social Engineering Video Training|
|Product Format||Paperback||Paperback||Two Paperback Set||Online Video Training|
|Audience Level||Beginner to Advanced||Beginner to Advanced||Beginner to Advanced||Beginner to Advanced|
|Content Length||416 pages||256 pages||752 pages||7+ hours|
|Author||Christopher Hadnagy & Paul Wilson||Christopher Hadnagy, Paul F. Kelly, & Paul Ekman||Christopher Hadnagy||Daniel Lowrie & Tom Updegrove|
|Publication Date||December 2010||February 2014||February 2014||October 2016|
|Imprint||Wiley||Wiley||Wiley||ITPro.TV, Powered by Sybex|
|Product Description||Tackles the unpredictable human element of security and walks readers through a unique framework for social engineering, explaining each principle before illustrating it with real-world security case studies||Helps security professionals decipher what people 'aren't saying' by focusing on the role of nonverbal communication in social engineering and how thinking like a human hacker can help uncover security vulnerabilities||Includes full-length versions of Social Engineering: The Art of Human Hacking and Unmasking the Social Engineer: The Human Element of Security at a discounted price||Complete video training solution covering social engineering and human hacking concepts, available as a complete season or as individual episodes - includes content on reconnaissance, elicitation, pretexting, psychological components, influence, remediation, and more|
From the Inside Flap
Forward written by Paul Wilson from The Real Hustle UK.
From the Back Cover
"Chris Hadnagy has penned the ultimate text on social engineering. Meticulously researched and teeming with practical applications, this brilliant book offers solutions to very real problems and ever-present dangers to your business — and even to yourself. Truly groundbreaking."
—Kevin Hogan, author of The Science of Influence: How to Get Anyone to Say "Yes" in 8 Minutes or Less
Discover the secrets of expert con men and human hackers
No matter how sophisticated your security equipment and procedures may be, their most easily exploitable aspect is, and has always been, the human infrastructure. The skilled, malicious social engineer is a weapon, nearly impossible to defend against.
This book covers, in detail, the world's first framework for social engineering. It defines, explains, and dissects each principle, then illustrates it with true stories and case studies from masters such as Kevin Mitnick, renowned author of The Art of Deception. You will discover just what it takes to excel as a social engineer. Then you will know your enemy.
Tour the Dark World of Social Engineering
Learn the psychological principles employed by social engineers and how they're used
Discover persuasion secrets that social engineers know well
See how the crafty crook takes advantage of cameras, GPS devices, and caller ID
Find out what information is, unbelievably, available online
Study real-world social engineering exploits step by step
"Most malware and client-side attacks have a social engineering component to deceive the user into letting the bad guys in. You can patch technical vulnerabilities as they evolve, but there is no patch for stupidity, or rather gullibility. Chris will show you how it's done by revealing the social engineering vectors used by today's intruders. His book will help you gain better insight on how to recognize these types of attacks."
—Kevin Mitnick, Author, Speaker, and Consultant
If you buy a new print edition of this book (or purchased one in the past), you can buy the Kindle edition for only $2.99 (Save 85%). Print edition purchase must be sold by Amazon. Learn more.
For thousands of qualifying books, your past, present, and future print-edition purchases now lets you buy the Kindle edition for $2.99 or less. (Textbooks available for $9.99 or less.)
If you are a seller for this product, would you like to suggest updates through seller support?
Top Customer Reviews
I know this book is somewhat controversial because it explains how to trick and con people. I think this type of information needs to be more widely publicized, if people only understood the threats that exist out there and how to avoid them then many security problems could be adverted. This book focuses strongly on humans as the weakest link in any security environment, this will always be true. If you are looking for an overview of both digital and local security, this book is fantastic. Also a great book for experienced pen testers looking for some new tools
Mr. Hadnagy organizes his book in a very thoughtful way, showing many case studies and examples of the terms in use. The topics escalate from information gathering to elicitation, onward to pretexting (how to become anyone in another person's eyes/ears), and psychological methods of tricking others. He discusses interviewing and interrogation, and spends a lot of time on influencing and manipulating others in a social engineering setting.
The book wraps up with a discussion of tools useful for anyone examining social engineering during security audits or social engineering/penetrating tests. There are a number of case studies that demonstrate how social engineers do their work, including some stories by the infamous Kevin Mitnick! Finally, the book wraps up with a discussion on how to prevent and mitigate the SE threat. Those working in the security field will find this discussion valuable and likely the most important part of the book. The challenge is daunting and Mr. Hadnagy discusses realistic methods for countering this insidious threat to our businesses and organizations.
To compliment the book, Mr. Hadnagy is one of the key developers of a complimentary resource, social-engineer.org, which discusses many of the book's topic in a framework for social engineering. This book is also the cornerstone of a graduate level course at Bellevue University (Nebraska) named "Human Aspects of Cybersecurity." Bellevue was designated a National Center of Academic Excellence in Information Assurance Education (CAE-IAE) for the academic years of 2012-2017 - indicating just how valuable this resource was to the overall cybersecurity graduate degree program.
Of all the books I've used in my college years, I have kept only about 8-10. This resource is #1 in my list of references and I highly recommend it for anyone curious or concerned about cybersecurity. Humans are the weakest link and it's about time you learned how to mitigate this threat before your security is compromised!
Chris has successfully created a complete guide in Social Engineering on a detailed level.
The book is very easy to understand, and it's easy to get into the details. It also explains different scenarios using scientific facts how it's working and how you - as the "attacker" have full controll of the situation.
You can never have a complete protection against Social Engineering, The book will explain why you can't protect and it's very important that the users knows that they are the targets and the attack would probably begin with an, from the user point of view, innocent and unimportant question several weeks earlier
The book provides you with the facts, tools and other resources to start practicing to become a really good Social Engineerer I
would defenitely recommend the book.
In fact I recommend this book to anyone who has even the slightest concern about their Personal Information and how people can gain access to it.
The seller Hippo Books does not provide tracking information, and sets a wide arrivel date.
Most Recent Customer Reviews
The pictures in the chapter about Micro Expressions are laughable though..