Social Engineering in IT Security: Tools, Tactics, and Techniques

  • 5h 55m
  • Sharon Conheady
  • McGraw-Hill/Osborne
  • 2014
Written by a global expert on the topic, this book discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results.