Posted on 3 Comments

Social Engineering: The Art of Human Hacking

Buy Now

The first audiobook to reveal and dissect the technical aspect of many social engineering maneuvers…

From elicitation, pretexting, influence, and manipulation, all aspects of social engineering are picked apart, discussed, and explained by using real world examples, personal experience, and the Science & Technology behind them to unraveled the mystery in social engineering.

Kevin Mitnick—one of the most famous social engineers in the world—popularized the term social engineering. He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable audiobook examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.

This audiobook:

-Examines social engineering, the Science & Technology of influencing a target to perform a desired task or divulge information;
-Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access; and
-Reveals vital steps for preventing social engineering threats.

Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers. Now you can do your part by putting to good use the critical information this audiobook provides.

Buy Now

3 thoughts on “Social Engineering: The Art of Human Hacking

  1. The definitive book on social engineering One can sum up all of Social Engineering: The Art of Human Hacking in two sentences from page 297, where author Christopher Hadnagy writes “tools are an important aspect of social engineering, but they do not make the social engineer. A tool alone is useless; but the knowledge of how to leverage and utilize that tool is invaluable”. Far too many people think that information security and data protection is simply about running tools, without understanding how to use them. In this tremendous…

  2. Very broad, no depth This book really isn’t about computer safety, or about personal safety – it’s just kind of all over. By page 40 I was skimming paragraphs, but page 100 I was skipping entire pages. This book is not written for people in the security field, nor is it really written for people who want to know more about their personal security. I think that if you know enough already to be aware of what social engineering is in the first place and have a decent understanding of personal computing safety – you…

  3. A real gem in the bookshelf This book is one of the best books I read in regards to (IT) security. I do absolutely recommend this book to any pentester, security officer or person interested in this very interesting aspect of security. Performing penetration tests and security audits myself I try to especially implement SE in tests and audits since it is the best way to find issues and the human factor is neglected in most of the tests and reviews.There was no book like this book before dealing with Social…

Leave a Reply