top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Phishing dark waters : the offensive and defensive sides of malicious e-mails / / Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke
Phishing dark waters : the offensive and defensive sides of malicious e-mails / / Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke
Autore Hadnagy Christopher
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , [2015]
Descrizione fisica 1 online resource (227 p.)
Disciplina 363.25
363.259680973
Soggetto topico Phishing
Identity theft
ISBN 1-118-95849-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Chapter 1 An Introduction to the Wild World of Phishing; Phishing 101; How People Phish; Examples; High-Profile Breaches; Phish in Their Natural Habitat; Phish with Bigger Teeth; Spear Phishing; Summary; Chapter 2 The Psychological Principles of Decision-Making; Decision-Making: Small Bits; Cognitive Bias; Physiological States; External Factors; The Bottom Line About Decision-Making; It Seemed Like a Good Idea at the Time; How Phishers Bait the Hook; Introducing the Amygdala; The Guild of Hijacked Amygdalas; Putting a Leash on the Amygdala
Wash, Rinse, RepeatSummary; Chapter 3 Influence and Manipulation; Why the Difference Matters to Us; How Do I Tell the Difference?; How Will We Build Rapport with Our Targets?; How Will Our Targets Feel After They Discover They've Been Tested?; What Is Our Intent?; But the Bad Guys Will Use Manipulation . . .; Lies, All Lies; P Is for Punishment; Principles of Influence; Reciprocity; Obligation; Concession; Scarcity; Authority; Consistency and Commitment; Liking; Social Proof; More Fun with Influence; Our Social Nature; Physiological Response; Psychological Response
Things to Know About ManipulationSummary; Chapter 4 Lessons in Protection; Lesson One: Critical Thinking; How Can Attackers Bypass This Method?; Lesson Two: Learn to Hover; What If I Already Clicked the Link and I Think It's Dangerous?; How Can Attackers Bypass This Method?; Lesson Three: URL Deciphering; How Can Attackers Bypass This Method?; Lesson Four: Analyzing E-mail Headers; How Can Attackers Bypass This Method?; Lesson Five: Sandboxing; How Can Attackers Bypass This Method?; The "Wall of Sheep," or a Net of Bad Ideas; Copy and Paste Your Troubles Away; Sharing Is Caring
My Mobile Is SecureA Good Antivirus Program Will Save You; Summary; Chapter 5 Plan Your Phishing Trip: Creating the Enterprise Phishing Program; The Basic Recipe; Why?; What's the Theme?; The Big, Fat, Not-So-Legal Section; Developing the Program; Setting a Baseline; Setting the Difficulty Level; Writing the Phish; Tracking and Statistics; Reporting; Phish, Educate, Repeat; Summary; Chapter 6 The Good, the Bad, and the Ugly: Policies and More; Oh, the Feels: Emotion and Policies; The Definition; The Bad; Making It "Good"; The Boss Is Exempt; The Definition; The Bad; Making It "Good"
I'll Just Patch One of the HolesThe Definition; The Bad; Making It "Good"; Phish Just Enough to Hate It; The Definition; The Bad; Making It "Good"; If You Spot a Phish, Call This Number; The Definition; The Bad; Making It "Good"; The Bad Guys Take Mondays Off; The Definition; The Bad; Making It "Good"; If You Can't See It, You Are Safe; The Definition; The Bad; Making It "Good"; The Lesson for Us All; Summary; Chapter 7 The Professional Phisher's Tackle Bag; Commercial Applications; Rapid7 Metasploit Pro; ThreatSim; PhishMe; Wombat PhishGuru; PhishLine; Open Source Applications
SET: Social-Engineer Toolkit
Record Nr. UNINA-9910131151303321
Hadnagy Christopher  
Indianapolis, Indiana : , : Wiley, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Phishing dark waters : the offensive and defensive sides of malicious e-mails / / Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke
Phishing dark waters : the offensive and defensive sides of malicious e-mails / / Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke
Autore Hadnagy Christopher
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , [2015]
Descrizione fisica 1 online resource (227 p.)
Disciplina 363.25
363.259680973
Soggetto topico Phishing
Identity theft
ISBN 1-118-95849-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Chapter 1 An Introduction to the Wild World of Phishing; Phishing 101; How People Phish; Examples; High-Profile Breaches; Phish in Their Natural Habitat; Phish with Bigger Teeth; Spear Phishing; Summary; Chapter 2 The Psychological Principles of Decision-Making; Decision-Making: Small Bits; Cognitive Bias; Physiological States; External Factors; The Bottom Line About Decision-Making; It Seemed Like a Good Idea at the Time; How Phishers Bait the Hook; Introducing the Amygdala; The Guild of Hijacked Amygdalas; Putting a Leash on the Amygdala
Wash, Rinse, RepeatSummary; Chapter 3 Influence and Manipulation; Why the Difference Matters to Us; How Do I Tell the Difference?; How Will We Build Rapport with Our Targets?; How Will Our Targets Feel After They Discover They've Been Tested?; What Is Our Intent?; But the Bad Guys Will Use Manipulation . . .; Lies, All Lies; P Is for Punishment; Principles of Influence; Reciprocity; Obligation; Concession; Scarcity; Authority; Consistency and Commitment; Liking; Social Proof; More Fun with Influence; Our Social Nature; Physiological Response; Psychological Response
Things to Know About ManipulationSummary; Chapter 4 Lessons in Protection; Lesson One: Critical Thinking; How Can Attackers Bypass This Method?; Lesson Two: Learn to Hover; What If I Already Clicked the Link and I Think It's Dangerous?; How Can Attackers Bypass This Method?; Lesson Three: URL Deciphering; How Can Attackers Bypass This Method?; Lesson Four: Analyzing E-mail Headers; How Can Attackers Bypass This Method?; Lesson Five: Sandboxing; How Can Attackers Bypass This Method?; The "Wall of Sheep," or a Net of Bad Ideas; Copy and Paste Your Troubles Away; Sharing Is Caring
My Mobile Is SecureA Good Antivirus Program Will Save You; Summary; Chapter 5 Plan Your Phishing Trip: Creating the Enterprise Phishing Program; The Basic Recipe; Why?; What's the Theme?; The Big, Fat, Not-So-Legal Section; Developing the Program; Setting a Baseline; Setting the Difficulty Level; Writing the Phish; Tracking and Statistics; Reporting; Phish, Educate, Repeat; Summary; Chapter 6 The Good, the Bad, and the Ugly: Policies and More; Oh, the Feels: Emotion and Policies; The Definition; The Bad; Making It "Good"; The Boss Is Exempt; The Definition; The Bad; Making It "Good"
I'll Just Patch One of the HolesThe Definition; The Bad; Making It "Good"; Phish Just Enough to Hate It; The Definition; The Bad; Making It "Good"; If You Spot a Phish, Call This Number; The Definition; The Bad; Making It "Good"; The Bad Guys Take Mondays Off; The Definition; The Bad; Making It "Good"; If You Can't See It, You Are Safe; The Definition; The Bad; Making It "Good"; The Lesson for Us All; Summary; Chapter 7 The Professional Phisher's Tackle Bag; Commercial Applications; Rapid7 Metasploit Pro; ThreatSim; PhishMe; Wombat PhishGuru; PhishLine; Open Source Applications
SET: Social-Engineer Toolkit
Record Nr. UNINA-9910812405503321
Hadnagy Christopher  
Indianapolis, Indiana : , : Wiley, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Social engineering : the science of human hacking / / Christopher Hadnagy
Social engineering : the science of human hacking / / Christopher Hadnagy
Autore Hadnagy Christopher
Edizione [Second edition.]
Pubbl/distr/stampa Indianapolis, IN : , : Wiley, , [2018]
Descrizione fisica 1 online resource (322 pages)
Disciplina 301
Soggetto topico Social engineering
Hackers
Soggetto genere / forma Electronic books.
ISBN 1-119-43375-4
1-119-43372-X
1-119-43373-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A look into the world of professional social engineering -- Do you see what I see? -- Profiling people through communication -- Becoming anyone you want to be -- I know how to make you like me -- Under the influence -- Building your artwork -- I can see what you didn't say -- Hacking the humans -- Do you have a M.A.P.P.? -- Now what?
Record Nr. UNINA-9910555267703321
Hadnagy Christopher  
Indianapolis, IN : , : Wiley, , [2018]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Social engineering : the science of human hacking / / Christopher Hadnagy
Social engineering : the science of human hacking / / Christopher Hadnagy
Autore Hadnagy Christopher
Edizione [Second edition.]
Pubbl/distr/stampa Indianapolis, IN : , : Wiley, , [2018]
Descrizione fisica 1 online resource (322 pages)
Disciplina 301
Soggetto topico Social engineering
Hackers
ISBN 1-119-43375-4
1-119-43372-X
1-119-43373-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A look into the world of professional social engineering -- Do you see what I see? -- Profiling people through communication -- Becoming anyone you want to be -- I know how to make you like me -- Under the influence -- Building your artwork -- I can see what you didn't say -- Hacking the humans -- Do you have a M.A.P.P.? -- Now what?
Record Nr. UNINA-9910816991603321
Hadnagy Christopher  
Indianapolis, IN : , : Wiley, , [2018]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Social Engineering [[electronic resource] ] : The Art of Human Hacking
Social Engineering [[electronic resource] ] : The Art of Human Hacking
Autore Hadnagy Christopher
Edizione [1st edition]
Pubbl/distr/stampa Chichester, : Wiley, 2010
Descrizione fisica 1 online resource (410 p.)
Disciplina 005.8
Soggetto topico Computer hackers
Human-computer interaction
Social engineering
Hackers
Computer security
Sociology & Social History
Engineering & Applied Sciences
Social Sciences
Computer Science
Social Change
Soggetto genere / forma Electronic books.
ISBN 1-282-93980-7
9786612939808
1-118-02801-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Social Engineering: The Art of Human Hacking; Contents; Foreword; Preface and Acknowledgments; Chapter 1: A Look into the World of Social Engineering; Why This Book Is So Valuable; Overview of Social Engineering; Summary; Chapter 2: Information Gathering; Gathering Information; Sources for Information Gathering; Communication Modeling; The Power of Communication Models; Chapter 3: Elicitation; What Is Elicitation?; The Goals of Elicitation; Mastering Elicitation; Summary; Chapter 4: Pretexting: How to Become Anyone; What Is Pretexting?; The Principles and Planning Stages of Pretexting
Successful PretextingSummary; Chapter 5: Mind Tricks: Psychological Principles Used in Social Engineering; Modes of Thinking; Microexpressions; Neurolinguistic Programming (NLP); Interview and Interrogation; Building Instant Rapport; The Human Buffer Overflow; Summary; Chapter 6: Influence: The Power of Persuasion; The Five Fundamentals of Influence and Persuasion; Influence Tactics; Altering Reality: Framing; Manipulation: Controlling Your Target; Manipulation in Social Engineering; Summary; Chapter 7: The Tools of the Social Engineer; Physical Tools; Online Information-Gathering Tools
SummaryChapter 8: Case Studies: Dissecting the Social Engineer; Mitnick Case Study 1: Hacking the DMV; Mitnick Case Study 2: Hacking the Social Security Administration; Hadnagy Case Study 1: The Overconfident CEO; Hadnagy Case Study 2: The Theme Park Scandal; Top-Secret Case Study 1: Mission Not Impossible; Top-Secret Case Study 2: Social Engineering a Hacker; Why Case Studies Are Important; Summary; Chapter 9: Prevention and Mitigation; Learning to Identify Social Engineering Attacks; Creating a Personal Security Awareness Culture
Being Aware of the Value of the Information You Are Being Asked ForKeeping Software Updated; Developing Scripts; Learning from Social Engineering Audits; Concluding Remarks; Summary; Index
Record Nr. UNINA-9910456725003321
Hadnagy Christopher  
Chichester, : Wiley, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Social Engineering [[electronic resource] ] : The Art of Human Hacking
Social Engineering [[electronic resource] ] : The Art of Human Hacking
Autore Hadnagy Christopher
Edizione [1st edition]
Pubbl/distr/stampa Chichester, : Wiley, 2010
Descrizione fisica 1 online resource (410 p.)
Disciplina 005.8
Soggetto topico Computer hackers
Human-computer interaction
Social engineering
Hackers
Computer security
Sociology & Social History
Engineering & Applied Sciences
Social Sciences
Computer Science
Social Change
ISBN 1-282-93980-7
9786612939808
1-118-02801-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Social Engineering: The Art of Human Hacking; Contents; Foreword; Preface and Acknowledgments; Chapter 1: A Look into the World of Social Engineering; Why This Book Is So Valuable; Overview of Social Engineering; Summary; Chapter 2: Information Gathering; Gathering Information; Sources for Information Gathering; Communication Modeling; The Power of Communication Models; Chapter 3: Elicitation; What Is Elicitation?; The Goals of Elicitation; Mastering Elicitation; Summary; Chapter 4: Pretexting: How to Become Anyone; What Is Pretexting?; The Principles and Planning Stages of Pretexting
Successful PretextingSummary; Chapter 5: Mind Tricks: Psychological Principles Used in Social Engineering; Modes of Thinking; Microexpressions; Neurolinguistic Programming (NLP); Interview and Interrogation; Building Instant Rapport; The Human Buffer Overflow; Summary; Chapter 6: Influence: The Power of Persuasion; The Five Fundamentals of Influence and Persuasion; Influence Tactics; Altering Reality: Framing; Manipulation: Controlling Your Target; Manipulation in Social Engineering; Summary; Chapter 7: The Tools of the Social Engineer; Physical Tools; Online Information-Gathering Tools
SummaryChapter 8: Case Studies: Dissecting the Social Engineer; Mitnick Case Study 1: Hacking the DMV; Mitnick Case Study 2: Hacking the Social Security Administration; Hadnagy Case Study 1: The Overconfident CEO; Hadnagy Case Study 2: The Theme Park Scandal; Top-Secret Case Study 1: Mission Not Impossible; Top-Secret Case Study 2: Social Engineering a Hacker; Why Case Studies Are Important; Summary; Chapter 9: Prevention and Mitigation; Learning to Identify Social Engineering Attacks; Creating a Personal Security Awareness Culture
Being Aware of the Value of the Information You Are Being Asked ForKeeping Software Updated; Developing Scripts; Learning from Social Engineering Audits; Concluding Remarks; Summary; Index
Record Nr. UNINA-9910781281503321
Hadnagy Christopher  
Chichester, : Wiley, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Unmasking the social engineer : the human element of security / / Christopher Hadnagy, Dr. Paul Ekman
Unmasking the social engineer : the human element of security / / Christopher Hadnagy, Dr. Paul Ekman
Autore Hadnagy Christopher
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , 2014
Descrizione fisica 1 online resource (258 p.)
Disciplina 005.8
Altri autori (Persone) EkmanPaul
Soggetto topico Christian sociology
Social problems
Soggetto genere / forma Electronic books.
ISBN 1-118-89956-3
1-118-60865-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Foreword; Acknowledgments and Preface; Introduction; The Scholar and the Student; Using This Book as a Social Engineer; Part I Building the Foundation; Chapter 1 What Is Nonverbal Communication?; The Different Aspects of Nonverbal Communication; Kinesics; Proxemics; Touch; Eye Contact; Olfactics; Adornment; Facial Expressions; How to Use This Information; Summary; Chapter 2 What Is Social Engineering?; Information Gathering; Pretexting; Elicitation; Rapport; Influence/Manipulation; Framing; Nonverbal Communications
The Three Basic Forms of Social EngineeringBecome Phishers of Men; When The Phone Is More Dangerous Than Malware; I Am Not the Social Engineer You Are Looking For; Using Social Engineering Skills; The Good; The Bad; The Ugly; Summary; Part II Decoding the Language of the Body; Chapter 3 Understanding the Language of the Hands; Communicating with Your Hands; Origin; Coding; Usage; High-Confidence Hand Displays; Low-Confidence and Stress Hand Displays; Getting a Handle on the Hands; Summary; Chapter 4 The Torso, Legs, and Feet; Legs and Feet; Torso and Arms; Summary
Chapter 5 The Science Behind the FaceJust the FACS; What Is a Truth Wizard?; Emotions versus Feelings; Fear; Surprise; Sadness; Contempt; Disgust; Anger; Happiness; Perfect Practice Makes Perfect; Summary; Chapter 6 Understanding Nonverbal Displays of Comfort and Discomfort; Neck and Face Pacifying; What to Watch For; Mouth Covers; What to Watch For; Lips; What to Watch For; Eye Blocking; What to Watch For; Self-Comforting and Head Tilts; What to Watch For; Summary; Part III Deciphering the Science; Chapter 7 The Human Emotional Processor; Introducing the Amygdala
How the Amygdala Processes InformationHijacking the Amygdala; Human See, Human Do; Reading Other People's Expressions; Your Own Emotional Content; Nonverbal Social Proof; Using Amygdala Hijacking as a Social Engineer; Summary; Chapter 8 The Nonverbal Side of Elicitation; Artificial Time Constraints; Sympathy/Assistance Themes; Ego Suspension; Ask How, When, and Why Questions; Conversational Signals; Action Unit 1: Inner Brow Raiser; Action Unit 2: Outer Brow Raiser; Action Unit 4: Brow Lowerer; Conversational Signals of Emotions; Breaking Down Conversational Signals; Batons; Underliner
PunctuationQuestion Mark; Word Search; Nonverbal Conversational Signals; Conversational Signals as a Social Engineer; Summary; Part IV Putting It All Together; Chapter 9 Nonverbal Communication and the Human Being; Applying This Information as a Professional Social Engineer; Using This Book to Defend; Becoming a Critical Thinker; Summary; Index
Record Nr. UNINA-9910465158403321
Hadnagy Christopher  
Indianapolis, Indiana : , : Wiley, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Unmasking the social engineer : the human element of security / / Christopher Hadnagy, Dr. Paul Ekman
Unmasking the social engineer : the human element of security / / Christopher Hadnagy, Dr. Paul Ekman
Autore Hadnagy Christopher
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , 2014
Descrizione fisica 1 online resource (258 p.)
Disciplina 005.8
Altri autori (Persone) EkmanPaul
Soggetto topico Christian sociology
Social problems
ISBN 1-118-89956-3
1-118-60865-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Foreword; Acknowledgments and Preface; Introduction; The Scholar and the Student; Using This Book as a Social Engineer; Part I Building the Foundation; Chapter 1 What Is Nonverbal Communication?; The Different Aspects of Nonverbal Communication; Kinesics; Proxemics; Touch; Eye Contact; Olfactics; Adornment; Facial Expressions; How to Use This Information; Summary; Chapter 2 What Is Social Engineering?; Information Gathering; Pretexting; Elicitation; Rapport; Influence/Manipulation; Framing; Nonverbal Communications
The Three Basic Forms of Social EngineeringBecome Phishers of Men; When The Phone Is More Dangerous Than Malware; I Am Not the Social Engineer You Are Looking For; Using Social Engineering Skills; The Good; The Bad; The Ugly; Summary; Part II Decoding the Language of the Body; Chapter 3 Understanding the Language of the Hands; Communicating with Your Hands; Origin; Coding; Usage; High-Confidence Hand Displays; Low-Confidence and Stress Hand Displays; Getting a Handle on the Hands; Summary; Chapter 4 The Torso, Legs, and Feet; Legs and Feet; Torso and Arms; Summary
Chapter 5 The Science Behind the FaceJust the FACS; What Is a Truth Wizard?; Emotions versus Feelings; Fear; Surprise; Sadness; Contempt; Disgust; Anger; Happiness; Perfect Practice Makes Perfect; Summary; Chapter 6 Understanding Nonverbal Displays of Comfort and Discomfort; Neck and Face Pacifying; What to Watch For; Mouth Covers; What to Watch For; Lips; What to Watch For; Eye Blocking; What to Watch For; Self-Comforting and Head Tilts; What to Watch For; Summary; Part III Deciphering the Science; Chapter 7 The Human Emotional Processor; Introducing the Amygdala
How the Amygdala Processes InformationHijacking the Amygdala; Human See, Human Do; Reading Other People's Expressions; Your Own Emotional Content; Nonverbal Social Proof; Using Amygdala Hijacking as a Social Engineer; Summary; Chapter 8 The Nonverbal Side of Elicitation; Artificial Time Constraints; Sympathy/Assistance Themes; Ego Suspension; Ask How, When, and Why Questions; Conversational Signals; Action Unit 1: Inner Brow Raiser; Action Unit 2: Outer Brow Raiser; Action Unit 4: Brow Lowerer; Conversational Signals of Emotions; Breaking Down Conversational Signals; Batons; Underliner
PunctuationQuestion Mark; Word Search; Nonverbal Conversational Signals; Conversational Signals as a Social Engineer; Summary; Part IV Putting It All Together; Chapter 9 Nonverbal Communication and the Human Being; Applying This Information as a Professional Social Engineer; Using This Book to Defend; Becoming a Critical Thinker; Summary; Index
Record Nr. UNINA-9910789117403321
Hadnagy Christopher  
Indianapolis, Indiana : , : Wiley, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Unmasking the social engineer : the human element of security / / Christopher Hadnagy, Dr. Paul Ekman
Unmasking the social engineer : the human element of security / / Christopher Hadnagy, Dr. Paul Ekman
Autore Hadnagy Christopher
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, Indiana : , : Wiley, , 2014
Descrizione fisica 1 online resource (258 p.)
Disciplina 005.8
Altri autori (Persone) EkmanPaul
Soggetto topico Christian sociology
Social problems
ISBN 1-118-89956-3
1-118-60865-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright; Contents; Foreword; Acknowledgments and Preface; Introduction; The Scholar and the Student; Using This Book as a Social Engineer; Part I Building the Foundation; Chapter 1 What Is Nonverbal Communication?; The Different Aspects of Nonverbal Communication; Kinesics; Proxemics; Touch; Eye Contact; Olfactics; Adornment; Facial Expressions; How to Use This Information; Summary; Chapter 2 What Is Social Engineering?; Information Gathering; Pretexting; Elicitation; Rapport; Influence/Manipulation; Framing; Nonverbal Communications
The Three Basic Forms of Social EngineeringBecome Phishers of Men; When The Phone Is More Dangerous Than Malware; I Am Not the Social Engineer You Are Looking For; Using Social Engineering Skills; The Good; The Bad; The Ugly; Summary; Part II Decoding the Language of the Body; Chapter 3 Understanding the Language of the Hands; Communicating with Your Hands; Origin; Coding; Usage; High-Confidence Hand Displays; Low-Confidence and Stress Hand Displays; Getting a Handle on the Hands; Summary; Chapter 4 The Torso, Legs, and Feet; Legs and Feet; Torso and Arms; Summary
Chapter 5 The Science Behind the FaceJust the FACS; What Is a Truth Wizard?; Emotions versus Feelings; Fear; Surprise; Sadness; Contempt; Disgust; Anger; Happiness; Perfect Practice Makes Perfect; Summary; Chapter 6 Understanding Nonverbal Displays of Comfort and Discomfort; Neck and Face Pacifying; What to Watch For; Mouth Covers; What to Watch For; Lips; What to Watch For; Eye Blocking; What to Watch For; Self-Comforting and Head Tilts; What to Watch For; Summary; Part III Deciphering the Science; Chapter 7 The Human Emotional Processor; Introducing the Amygdala
How the Amygdala Processes InformationHijacking the Amygdala; Human See, Human Do; Reading Other People's Expressions; Your Own Emotional Content; Nonverbal Social Proof; Using Amygdala Hijacking as a Social Engineer; Summary; Chapter 8 The Nonverbal Side of Elicitation; Artificial Time Constraints; Sympathy/Assistance Themes; Ego Suspension; Ask How, When, and Why Questions; Conversational Signals; Action Unit 1: Inner Brow Raiser; Action Unit 2: Outer Brow Raiser; Action Unit 4: Brow Lowerer; Conversational Signals of Emotions; Breaking Down Conversational Signals; Batons; Underliner
PunctuationQuestion Mark; Word Search; Nonverbal Conversational Signals; Conversational Signals as a Social Engineer; Summary; Part IV Putting It All Together; Chapter 9 Nonverbal Communication and the Human Being; Applying This Information as a Professional Social Engineer; Using This Book to Defend; Becoming a Critical Thinker; Summary; Index
Record Nr. UNINA-9910810143203321
Hadnagy Christopher  
Indianapolis, Indiana : , : Wiley, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui