Phishing dark waters : the offensive and defensive sides of malicious e-mails / / Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke
| Phishing dark waters : the offensive and defensive sides of malicious e-mails / / Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke |
| Autore | Hadnagy Christopher |
| Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , [2015] |
| Descrizione fisica | 1 online resource (227 p.) |
| Disciplina |
363.25
363.259680973 |
| Soggetto topico |
Phishing
Identity theft |
| ISBN | 1-118-95849-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Chapter 1 An Introduction to the Wild World of Phishing; Phishing 101; How People Phish; Examples; High-Profile Breaches; Phish in Their Natural Habitat; Phish with Bigger Teeth; Spear Phishing; Summary; Chapter 2 The Psychological Principles of Decision-Making; Decision-Making: Small Bits; Cognitive Bias; Physiological States; External Factors; The Bottom Line About Decision-Making; It Seemed Like a Good Idea at the Time; How Phishers Bait the Hook; Introducing the Amygdala; The Guild of Hijacked Amygdalas; Putting a Leash on the Amygdala
Wash, Rinse, RepeatSummary; Chapter 3 Influence and Manipulation; Why the Difference Matters to Us; How Do I Tell the Difference?; How Will We Build Rapport with Our Targets?; How Will Our Targets Feel After They Discover They've Been Tested?; What Is Our Intent?; But the Bad Guys Will Use Manipulation . . .; Lies, All Lies; P Is for Punishment; Principles of Influence; Reciprocity; Obligation; Concession; Scarcity; Authority; Consistency and Commitment; Liking; Social Proof; More Fun with Influence; Our Social Nature; Physiological Response; Psychological Response Things to Know About ManipulationSummary; Chapter 4 Lessons in Protection; Lesson One: Critical Thinking; How Can Attackers Bypass This Method?; Lesson Two: Learn to Hover; What If I Already Clicked the Link and I Think It's Dangerous?; How Can Attackers Bypass This Method?; Lesson Three: URL Deciphering; How Can Attackers Bypass This Method?; Lesson Four: Analyzing E-mail Headers; How Can Attackers Bypass This Method?; Lesson Five: Sandboxing; How Can Attackers Bypass This Method?; The "Wall of Sheep," or a Net of Bad Ideas; Copy and Paste Your Troubles Away; Sharing Is Caring My Mobile Is SecureA Good Antivirus Program Will Save You; Summary; Chapter 5 Plan Your Phishing Trip: Creating the Enterprise Phishing Program; The Basic Recipe; Why?; What's the Theme?; The Big, Fat, Not-So-Legal Section; Developing the Program; Setting a Baseline; Setting the Difficulty Level; Writing the Phish; Tracking and Statistics; Reporting; Phish, Educate, Repeat; Summary; Chapter 6 The Good, the Bad, and the Ugly: Policies and More; Oh, the Feels: Emotion and Policies; The Definition; The Bad; Making It "Good"; The Boss Is Exempt; The Definition; The Bad; Making It "Good" I'll Just Patch One of the HolesThe Definition; The Bad; Making It "Good"; Phish Just Enough to Hate It; The Definition; The Bad; Making It "Good"; If You Spot a Phish, Call This Number; The Definition; The Bad; Making It "Good"; The Bad Guys Take Mondays Off; The Definition; The Bad; Making It "Good"; If You Can't See It, You Are Safe; The Definition; The Bad; Making It "Good"; The Lesson for Us All; Summary; Chapter 7 The Professional Phisher's Tackle Bag; Commercial Applications; Rapid7 Metasploit Pro; ThreatSim; PhishMe; Wombat PhishGuru; PhishLine; Open Source Applications SET: Social-Engineer Toolkit |
| Record Nr. | UNINA-9910131151303321 |
Hadnagy Christopher
|
||
| Indianapolis, Indiana : , : Wiley, , [2015] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Phishing dark waters : the offensive and defensive sides of malicious e-mails / / Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke
| Phishing dark waters : the offensive and defensive sides of malicious e-mails / / Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke |
| Autore | Hadnagy Christopher |
| Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , [2015] |
| Descrizione fisica | 1 online resource (227 p.) |
| Disciplina |
363.25
363.259680973 |
| Soggetto topico |
Phishing
Identity theft |
| ISBN | 1-118-95849-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Chapter 1 An Introduction to the Wild World of Phishing; Phishing 101; How People Phish; Examples; High-Profile Breaches; Phish in Their Natural Habitat; Phish with Bigger Teeth; Spear Phishing; Summary; Chapter 2 The Psychological Principles of Decision-Making; Decision-Making: Small Bits; Cognitive Bias; Physiological States; External Factors; The Bottom Line About Decision-Making; It Seemed Like a Good Idea at the Time; How Phishers Bait the Hook; Introducing the Amygdala; The Guild of Hijacked Amygdalas; Putting a Leash on the Amygdala
Wash, Rinse, RepeatSummary; Chapter 3 Influence and Manipulation; Why the Difference Matters to Us; How Do I Tell the Difference?; How Will We Build Rapport with Our Targets?; How Will Our Targets Feel After They Discover They've Been Tested?; What Is Our Intent?; But the Bad Guys Will Use Manipulation . . .; Lies, All Lies; P Is for Punishment; Principles of Influence; Reciprocity; Obligation; Concession; Scarcity; Authority; Consistency and Commitment; Liking; Social Proof; More Fun with Influence; Our Social Nature; Physiological Response; Psychological Response Things to Know About ManipulationSummary; Chapter 4 Lessons in Protection; Lesson One: Critical Thinking; How Can Attackers Bypass This Method?; Lesson Two: Learn to Hover; What If I Already Clicked the Link and I Think It's Dangerous?; How Can Attackers Bypass This Method?; Lesson Three: URL Deciphering; How Can Attackers Bypass This Method?; Lesson Four: Analyzing E-mail Headers; How Can Attackers Bypass This Method?; Lesson Five: Sandboxing; How Can Attackers Bypass This Method?; The "Wall of Sheep," or a Net of Bad Ideas; Copy and Paste Your Troubles Away; Sharing Is Caring My Mobile Is SecureA Good Antivirus Program Will Save You; Summary; Chapter 5 Plan Your Phishing Trip: Creating the Enterprise Phishing Program; The Basic Recipe; Why?; What's the Theme?; The Big, Fat, Not-So-Legal Section; Developing the Program; Setting a Baseline; Setting the Difficulty Level; Writing the Phish; Tracking and Statistics; Reporting; Phish, Educate, Repeat; Summary; Chapter 6 The Good, the Bad, and the Ugly: Policies and More; Oh, the Feels: Emotion and Policies; The Definition; The Bad; Making It "Good"; The Boss Is Exempt; The Definition; The Bad; Making It "Good" I'll Just Patch One of the HolesThe Definition; The Bad; Making It "Good"; Phish Just Enough to Hate It; The Definition; The Bad; Making It "Good"; If You Spot a Phish, Call This Number; The Definition; The Bad; Making It "Good"; The Bad Guys Take Mondays Off; The Definition; The Bad; Making It "Good"; If You Can't See It, You Are Safe; The Definition; The Bad; Making It "Good"; The Lesson for Us All; Summary; Chapter 7 The Professional Phisher's Tackle Bag; Commercial Applications; Rapid7 Metasploit Pro; ThreatSim; PhishMe; Wombat PhishGuru; PhishLine; Open Source Applications SET: Social-Engineer Toolkit |
| Record Nr. | UNINA-9910812405503321 |
Hadnagy Christopher
|
||
| Indianapolis, Indiana : , : Wiley, , [2015] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Social engineering : the science of human hacking / / Christopher Hadnagy
| Social engineering : the science of human hacking / / Christopher Hadnagy |
| Autore | Hadnagy Christopher |
| Edizione | [Second edition.] |
| Pubbl/distr/stampa | Indianapolis, IN : , : Wiley, , [2018] |
| Descrizione fisica | 1 online resource (322 pages) |
| Disciplina | 301 |
| Soggetto topico |
Social engineering
Hackers |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-119-43375-4
1-119-43372-X 1-119-43373-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | A look into the world of professional social engineering -- Do you see what I see? -- Profiling people through communication -- Becoming anyone you want to be -- I know how to make you like me -- Under the influence -- Building your artwork -- I can see what you didn't say -- Hacking the humans -- Do you have a M.A.P.P.? -- Now what? |
| Record Nr. | UNINA-9910555267703321 |
Hadnagy Christopher
|
||
| Indianapolis, IN : , : Wiley, , [2018] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Social engineering : the science of human hacking / / Christopher Hadnagy
| Social engineering : the science of human hacking / / Christopher Hadnagy |
| Autore | Hadnagy Christopher |
| Edizione | [Second edition.] |
| Pubbl/distr/stampa | Indianapolis, IN : , : Wiley, , [2018] |
| Descrizione fisica | 1 online resource (322 pages) |
| Disciplina | 301 |
| Soggetto topico |
Social engineering
Hackers |
| ISBN |
1-119-43375-4
1-119-43372-X 1-119-43373-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | A look into the world of professional social engineering -- Do you see what I see? -- Profiling people through communication -- Becoming anyone you want to be -- I know how to make you like me -- Under the influence -- Building your artwork -- I can see what you didn't say -- Hacking the humans -- Do you have a M.A.P.P.? -- Now what? |
| Record Nr. | UNINA-9910816991603321 |
Hadnagy Christopher
|
||
| Indianapolis, IN : , : Wiley, , [2018] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Social Engineering [[electronic resource] ] : The Art of Human Hacking
| Social Engineering [[electronic resource] ] : The Art of Human Hacking |
| Autore | Hadnagy Christopher |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Chichester, : Wiley, 2010 |
| Descrizione fisica | 1 online resource (410 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer hackers
Human-computer interaction Social engineering Hackers Computer security Sociology & Social History Engineering & Applied Sciences Social Sciences Computer Science Social Change |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-282-93980-7
9786612939808 1-118-02801-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Social Engineering: The Art of Human Hacking; Contents; Foreword; Preface and Acknowledgments; Chapter 1: A Look into the World of Social Engineering; Why This Book Is So Valuable; Overview of Social Engineering; Summary; Chapter 2: Information Gathering; Gathering Information; Sources for Information Gathering; Communication Modeling; The Power of Communication Models; Chapter 3: Elicitation; What Is Elicitation?; The Goals of Elicitation; Mastering Elicitation; Summary; Chapter 4: Pretexting: How to Become Anyone; What Is Pretexting?; The Principles and Planning Stages of Pretexting
Successful PretextingSummary; Chapter 5: Mind Tricks: Psychological Principles Used in Social Engineering; Modes of Thinking; Microexpressions; Neurolinguistic Programming (NLP); Interview and Interrogation; Building Instant Rapport; The Human Buffer Overflow; Summary; Chapter 6: Influence: The Power of Persuasion; The Five Fundamentals of Influence and Persuasion; Influence Tactics; Altering Reality: Framing; Manipulation: Controlling Your Target; Manipulation in Social Engineering; Summary; Chapter 7: The Tools of the Social Engineer; Physical Tools; Online Information-Gathering Tools SummaryChapter 8: Case Studies: Dissecting the Social Engineer; Mitnick Case Study 1: Hacking the DMV; Mitnick Case Study 2: Hacking the Social Security Administration; Hadnagy Case Study 1: The Overconfident CEO; Hadnagy Case Study 2: The Theme Park Scandal; Top-Secret Case Study 1: Mission Not Impossible; Top-Secret Case Study 2: Social Engineering a Hacker; Why Case Studies Are Important; Summary; Chapter 9: Prevention and Mitigation; Learning to Identify Social Engineering Attacks; Creating a Personal Security Awareness Culture Being Aware of the Value of the Information You Are Being Asked ForKeeping Software Updated; Developing Scripts; Learning from Social Engineering Audits; Concluding Remarks; Summary; Index |
| Record Nr. | UNINA-9910456725003321 |
Hadnagy Christopher
|
||
| Chichester, : Wiley, 2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Social Engineering [[electronic resource] ] : The Art of Human Hacking
| Social Engineering [[electronic resource] ] : The Art of Human Hacking |
| Autore | Hadnagy Christopher |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Chichester, : Wiley, 2010 |
| Descrizione fisica | 1 online resource (410 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer hackers
Human-computer interaction Social engineering Hackers Computer security Sociology & Social History Engineering & Applied Sciences Social Sciences Computer Science Social Change |
| ISBN |
1-282-93980-7
9786612939808 1-118-02801-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Social Engineering: The Art of Human Hacking; Contents; Foreword; Preface and Acknowledgments; Chapter 1: A Look into the World of Social Engineering; Why This Book Is So Valuable; Overview of Social Engineering; Summary; Chapter 2: Information Gathering; Gathering Information; Sources for Information Gathering; Communication Modeling; The Power of Communication Models; Chapter 3: Elicitation; What Is Elicitation?; The Goals of Elicitation; Mastering Elicitation; Summary; Chapter 4: Pretexting: How to Become Anyone; What Is Pretexting?; The Principles and Planning Stages of Pretexting
Successful PretextingSummary; Chapter 5: Mind Tricks: Psychological Principles Used in Social Engineering; Modes of Thinking; Microexpressions; Neurolinguistic Programming (NLP); Interview and Interrogation; Building Instant Rapport; The Human Buffer Overflow; Summary; Chapter 6: Influence: The Power of Persuasion; The Five Fundamentals of Influence and Persuasion; Influence Tactics; Altering Reality: Framing; Manipulation: Controlling Your Target; Manipulation in Social Engineering; Summary; Chapter 7: The Tools of the Social Engineer; Physical Tools; Online Information-Gathering Tools SummaryChapter 8: Case Studies: Dissecting the Social Engineer; Mitnick Case Study 1: Hacking the DMV; Mitnick Case Study 2: Hacking the Social Security Administration; Hadnagy Case Study 1: The Overconfident CEO; Hadnagy Case Study 2: The Theme Park Scandal; Top-Secret Case Study 1: Mission Not Impossible; Top-Secret Case Study 2: Social Engineering a Hacker; Why Case Studies Are Important; Summary; Chapter 9: Prevention and Mitigation; Learning to Identify Social Engineering Attacks; Creating a Personal Security Awareness Culture Being Aware of the Value of the Information You Are Being Asked ForKeeping Software Updated; Developing Scripts; Learning from Social Engineering Audits; Concluding Remarks; Summary; Index |
| Record Nr. | UNINA-9910781281503321 |
Hadnagy Christopher
|
||
| Chichester, : Wiley, 2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Unmasking the social engineer : the human element of security / / Christopher Hadnagy, Dr. Paul Ekman
| Unmasking the social engineer : the human element of security / / Christopher Hadnagy, Dr. Paul Ekman |
| Autore | Hadnagy Christopher |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , 2014 |
| Descrizione fisica | 1 online resource (258 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) | EkmanPaul |
| Soggetto topico |
Christian sociology
Social problems |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-118-89956-3
1-118-60865-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Foreword; Acknowledgments and Preface; Introduction; The Scholar and the Student; Using This Book as a Social Engineer; Part I Building the Foundation; Chapter 1 What Is Nonverbal Communication?; The Different Aspects of Nonverbal Communication; Kinesics; Proxemics; Touch; Eye Contact; Olfactics; Adornment; Facial Expressions; How to Use This Information; Summary; Chapter 2 What Is Social Engineering?; Information Gathering; Pretexting; Elicitation; Rapport; Influence/Manipulation; Framing; Nonverbal Communications
The Three Basic Forms of Social EngineeringBecome Phishers of Men; When The Phone Is More Dangerous Than Malware; I Am Not the Social Engineer You Are Looking For; Using Social Engineering Skills; The Good; The Bad; The Ugly; Summary; Part II Decoding the Language of the Body; Chapter 3 Understanding the Language of the Hands; Communicating with Your Hands; Origin; Coding; Usage; High-Confidence Hand Displays; Low-Confidence and Stress Hand Displays; Getting a Handle on the Hands; Summary; Chapter 4 The Torso, Legs, and Feet; Legs and Feet; Torso and Arms; Summary Chapter 5 The Science Behind the FaceJust the FACS; What Is a Truth Wizard?; Emotions versus Feelings; Fear; Surprise; Sadness; Contempt; Disgust; Anger; Happiness; Perfect Practice Makes Perfect; Summary; Chapter 6 Understanding Nonverbal Displays of Comfort and Discomfort; Neck and Face Pacifying; What to Watch For; Mouth Covers; What to Watch For; Lips; What to Watch For; Eye Blocking; What to Watch For; Self-Comforting and Head Tilts; What to Watch For; Summary; Part III Deciphering the Science; Chapter 7 The Human Emotional Processor; Introducing the Amygdala How the Amygdala Processes InformationHijacking the Amygdala; Human See, Human Do; Reading Other People's Expressions; Your Own Emotional Content; Nonverbal Social Proof; Using Amygdala Hijacking as a Social Engineer; Summary; Chapter 8 The Nonverbal Side of Elicitation; Artificial Time Constraints; Sympathy/Assistance Themes; Ego Suspension; Ask How, When, and Why Questions; Conversational Signals; Action Unit 1: Inner Brow Raiser; Action Unit 2: Outer Brow Raiser; Action Unit 4: Brow Lowerer; Conversational Signals of Emotions; Breaking Down Conversational Signals; Batons; Underliner PunctuationQuestion Mark; Word Search; Nonverbal Conversational Signals; Conversational Signals as a Social Engineer; Summary; Part IV Putting It All Together; Chapter 9 Nonverbal Communication and the Human Being; Applying This Information as a Professional Social Engineer; Using This Book to Defend; Becoming a Critical Thinker; Summary; Index |
| Record Nr. | UNINA-9910465158403321 |
Hadnagy Christopher
|
||
| Indianapolis, Indiana : , : Wiley, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Unmasking the social engineer : the human element of security / / Christopher Hadnagy, Dr. Paul Ekman
| Unmasking the social engineer : the human element of security / / Christopher Hadnagy, Dr. Paul Ekman |
| Autore | Hadnagy Christopher |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , 2014 |
| Descrizione fisica | 1 online resource (258 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) | EkmanPaul |
| Soggetto topico |
Christian sociology
Social problems |
| ISBN |
1-118-89956-3
1-118-60865-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Foreword; Acknowledgments and Preface; Introduction; The Scholar and the Student; Using This Book as a Social Engineer; Part I Building the Foundation; Chapter 1 What Is Nonverbal Communication?; The Different Aspects of Nonverbal Communication; Kinesics; Proxemics; Touch; Eye Contact; Olfactics; Adornment; Facial Expressions; How to Use This Information; Summary; Chapter 2 What Is Social Engineering?; Information Gathering; Pretexting; Elicitation; Rapport; Influence/Manipulation; Framing; Nonverbal Communications
The Three Basic Forms of Social EngineeringBecome Phishers of Men; When The Phone Is More Dangerous Than Malware; I Am Not the Social Engineer You Are Looking For; Using Social Engineering Skills; The Good; The Bad; The Ugly; Summary; Part II Decoding the Language of the Body; Chapter 3 Understanding the Language of the Hands; Communicating with Your Hands; Origin; Coding; Usage; High-Confidence Hand Displays; Low-Confidence and Stress Hand Displays; Getting a Handle on the Hands; Summary; Chapter 4 The Torso, Legs, and Feet; Legs and Feet; Torso and Arms; Summary Chapter 5 The Science Behind the FaceJust the FACS; What Is a Truth Wizard?; Emotions versus Feelings; Fear; Surprise; Sadness; Contempt; Disgust; Anger; Happiness; Perfect Practice Makes Perfect; Summary; Chapter 6 Understanding Nonverbal Displays of Comfort and Discomfort; Neck and Face Pacifying; What to Watch For; Mouth Covers; What to Watch For; Lips; What to Watch For; Eye Blocking; What to Watch For; Self-Comforting and Head Tilts; What to Watch For; Summary; Part III Deciphering the Science; Chapter 7 The Human Emotional Processor; Introducing the Amygdala How the Amygdala Processes InformationHijacking the Amygdala; Human See, Human Do; Reading Other People's Expressions; Your Own Emotional Content; Nonverbal Social Proof; Using Amygdala Hijacking as a Social Engineer; Summary; Chapter 8 The Nonverbal Side of Elicitation; Artificial Time Constraints; Sympathy/Assistance Themes; Ego Suspension; Ask How, When, and Why Questions; Conversational Signals; Action Unit 1: Inner Brow Raiser; Action Unit 2: Outer Brow Raiser; Action Unit 4: Brow Lowerer; Conversational Signals of Emotions; Breaking Down Conversational Signals; Batons; Underliner PunctuationQuestion Mark; Word Search; Nonverbal Conversational Signals; Conversational Signals as a Social Engineer; Summary; Part IV Putting It All Together; Chapter 9 Nonverbal Communication and the Human Being; Applying This Information as a Professional Social Engineer; Using This Book to Defend; Becoming a Critical Thinker; Summary; Index |
| Record Nr. | UNINA-9910789117403321 |
Hadnagy Christopher
|
||
| Indianapolis, Indiana : , : Wiley, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Unmasking the social engineer : the human element of security / / Christopher Hadnagy, Dr. Paul Ekman
| Unmasking the social engineer : the human element of security / / Christopher Hadnagy, Dr. Paul Ekman |
| Autore | Hadnagy Christopher |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Indianapolis, Indiana : , : Wiley, , 2014 |
| Descrizione fisica | 1 online resource (258 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) | EkmanPaul |
| Soggetto topico |
Christian sociology
Social problems |
| ISBN |
1-118-89956-3
1-118-60865-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Title Page; Copyright; Contents; Foreword; Acknowledgments and Preface; Introduction; The Scholar and the Student; Using This Book as a Social Engineer; Part I Building the Foundation; Chapter 1 What Is Nonverbal Communication?; The Different Aspects of Nonverbal Communication; Kinesics; Proxemics; Touch; Eye Contact; Olfactics; Adornment; Facial Expressions; How to Use This Information; Summary; Chapter 2 What Is Social Engineering?; Information Gathering; Pretexting; Elicitation; Rapport; Influence/Manipulation; Framing; Nonverbal Communications
The Three Basic Forms of Social EngineeringBecome Phishers of Men; When The Phone Is More Dangerous Than Malware; I Am Not the Social Engineer You Are Looking For; Using Social Engineering Skills; The Good; The Bad; The Ugly; Summary; Part II Decoding the Language of the Body; Chapter 3 Understanding the Language of the Hands; Communicating with Your Hands; Origin; Coding; Usage; High-Confidence Hand Displays; Low-Confidence and Stress Hand Displays; Getting a Handle on the Hands; Summary; Chapter 4 The Torso, Legs, and Feet; Legs and Feet; Torso and Arms; Summary Chapter 5 The Science Behind the FaceJust the FACS; What Is a Truth Wizard?; Emotions versus Feelings; Fear; Surprise; Sadness; Contempt; Disgust; Anger; Happiness; Perfect Practice Makes Perfect; Summary; Chapter 6 Understanding Nonverbal Displays of Comfort and Discomfort; Neck and Face Pacifying; What to Watch For; Mouth Covers; What to Watch For; Lips; What to Watch For; Eye Blocking; What to Watch For; Self-Comforting and Head Tilts; What to Watch For; Summary; Part III Deciphering the Science; Chapter 7 The Human Emotional Processor; Introducing the Amygdala How the Amygdala Processes InformationHijacking the Amygdala; Human See, Human Do; Reading Other People's Expressions; Your Own Emotional Content; Nonverbal Social Proof; Using Amygdala Hijacking as a Social Engineer; Summary; Chapter 8 The Nonverbal Side of Elicitation; Artificial Time Constraints; Sympathy/Assistance Themes; Ego Suspension; Ask How, When, and Why Questions; Conversational Signals; Action Unit 1: Inner Brow Raiser; Action Unit 2: Outer Brow Raiser; Action Unit 4: Brow Lowerer; Conversational Signals of Emotions; Breaking Down Conversational Signals; Batons; Underliner PunctuationQuestion Mark; Word Search; Nonverbal Conversational Signals; Conversational Signals as a Social Engineer; Summary; Part IV Putting It All Together; Chapter 9 Nonverbal Communication and the Human Being; Applying This Information as a Professional Social Engineer; Using This Book to Defend; Becoming a Critical Thinker; Summary; Index |
| Record Nr. | UNINA-9910810143203321 |
Hadnagy Christopher
|
||
| Indianapolis, Indiana : , : Wiley, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||