Get Free Shipping on orders over $79
Social Engineering in IT Security : Tools, Tactics, and Techniques - Sharon Conheady

Social Engineering in IT Security

Tools, Tactics, and Techniques

By: Sharon Conheady

Paperback | 14 July 2014 | Edition Number 1

At a Glance

Paperback


RRP $76.95

$66.75

13%OFF

or 4 interest-free payments of $16.69 with

 or 

Ships in 25 to 30 business days

Publisher''s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.


Cutting-edge social engineering testing techniques

"Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--Slashdot

Conduct ethical social engineering tests to identify an organization''s susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. Specific measures you can take to defend against weaknesses a social engineer may exploit are discussed in detail. This practical guide also addresses the impact of new and emerging technologies on future trends in social engineering.

  • Explore the evolution of social engineering, from the classic con artist to the modern social engineer
  • Understand the legal and ethical aspects of performing a social engineering test
  • Find out why social engineering works from a victim''s point of view
  • Plan a social engineering test--perform a threat assessment, scope the test, set goals, implement project planning, and define the rules of engagement
  • Gather information through research and reconnaissance
  • Create a credible social engineering scenario
  • Execute both on-site and remote social engineering tests
  • Write an effective social engineering report
  • Learn about various tools, including software, hardware, and on-site tools
  • Defend your organization against social engineering attacks

More in Network Programming

Seven Concurrency Models in Seven Weeks : When Threads Unravel - Paul Butcher
Web Services Security : Application Development - Mark O'Neill
RFID Implementation - Dennis Brown

$215.75

Delivering Carrier Ethernet : Extending Ethernet Beyond the LAN - Abdul Kasim
Microsoft Windows Server 2008 : A Beginner's Guide - Marty Matthews
Microsoft Windows Server 2008 : The Complete Reference - Danielle Ruest
Fixed Mobile Convergence : McGraw-Hill Communications Series - Alex Shneyderman
Microsoft Exchange Server 2007 : The Complete Reference - Richard Luckett
Hacking Exposed Linux : Hacking Exposed - ISECOM

RRP $105.95

$85.99

19%
OFF
Sentiment Analysis in Social Networks - Federico Pozzi

RRP $93.95

$87.75

Python Passive Network Mapping : P2NMAP - Chet Hosmer

RRP $109.95

$99.75

Internet of Things : Principles and Paradigms - Amir Dastjerdi

RRP $140.95

$118.75

16%
OFF