Social Engineering in IT Security: Tools, Tactics, and Techniques
Book Details
Format
Paperback / Softback
ISBN-10
0071818464
ISBN-13
9780071818469
Publisher
McGraw-Hill Education - Europe
Imprint
McGraw-Hill Professional
Country of Manufacture
US
Country of Publication
GB
Publication Date
Sep 16th, 2014
Print length
272 Pages
Weight
526 grams
Dimensions
23.20 x 18.90 x 1.30 cms
Product Classification:
Computer securityNetwork security
Ksh 7,900.00
Werezi Extended Catalogue
0 in stock
Delivery Location
Delivery fee: Select location
Secure
Quality
Fast
Filled with cutting-edge social engineering testing techniques that are legally and ethically sound, this book fully explains how to plan for a social engineering test, perform reconnaissance, implement the test, and accurately report the results.
Publisher''s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Cutting-edge social engineering testing techniques
"Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--SlashdotConduct ethical social engineering tests to identify an organization''s susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. Specific measures you can take to defend against weaknesses a social engineer may exploit are discussed in detail. This practical guide also addresses the impact of new and emerging technologies on future trends in social engineering.- Explore the evolution of social engineering, from the classic con artist to the modern social engineer
- Understand the legal and ethical aspects of performing a social engineering test
- Find out why social engineering works from a victim''s point of view
- Plan a social engineering test--perform a threat assessment, scope the test, set goals, implement project planning, and define the rules of engagement
- Gather information through research and reconnaissance
- Create a credible social engineering scenario
- Execute both on-site and remote social engineering tests
- Write an effective social engineering report
- Learn about various tools, including software, hardware, and on-site tools
- Defend your organization against social engineering attacks
Get Social Engineering in IT Security: Tools, Tactics, and Techniques by at the best price and quality guaranteed only at Werezi Africa's largest book ecommerce store. The book was published by McGraw-Hill Education - Europe and it has pages.