null
Loading... Please wait...
FREE SHIPPING on All Unbranded Items LEARN MORE
Print This Page

Social Engineering in IT Security: Tools, Tactics, and Techniques

List Price: $52.00
SKU:
9780071818469
Quantity:
Minimum Purchase
25 unit(s)
  • Availability: Confirm prior to ordering
  • Branding: minimum 50 pieces (add’l costs below)
  • Check Freight Rates (branded products only)

Branding Options (v), Availability & Lead Times

  • 1-Color Imprint: $2.00 ea.
  • Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
  • Belly-Band Wrap: $2.50 ea. (full-color printed)
  • Set-Up Charge: $45 per decoration
FULL DETAILS
  • Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
  • Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
  • Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
  • RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
  • Product Details

    Author:
    Sharon Conheady
    Format:
    Paperback
    Publisher:
    McGraw Hill LLC (August 4, 2014)
    Audience:
    General/trade
    ISBN-13:
    9780071818469
    ISBN-10:
    0071818464
    Weight:
    16oz
    File:
    McGrawHill-MH_ONIX_V30_US_onix30_all(26_05_19)-20260519.xml
    Folder:
    McGrawHill
    As low as:
    $40.04
    List Price:
    $52.00
    Dimensions:
    7.5" x 9.1" x 0.55"
    Case Pack:
    26
    Publisher Identifier:
    P-MCGRAW
    Discount Code:
    A
    Pages:
    272
    Pub Discount:
    55
    Imprint:
    McGraw Hill
  • Overview

    Cutting-edge social engineering testing techniques

    "Provides all of the core areas and nearly everything [you] need to know about the fundamentals of the topic."--Slashdot

    Conduct ethical social engineering tests to identify an organization's susceptibility to attack. Written by a global expert on the topic, Social Engineering in IT Security discusses the roots and rise of social engineering and presents a proven methodology for planning a test, performing reconnaissance, developing scenarios, implementing the test, and accurately reporting the results. Specific measures you can take to defend against weaknesses a social engineer may exploit are discussed in detail. This practical guide also addresses the impact of new and emerging technologies on future trends in social engineering.

    • Explore the evolution of social engineering, from the classic con artist to the modern social engineer
    • Understand the legal and ethical aspects of performing a social engineering test
    • Find out why social engineering works from a victim's point of view
    • Plan a social engineering test--perform a threat assessment, scope the test, set goals, implement project planning, and define the rules of engagement
    • Gather information through research and reconnaissance
    • Create a credible social engineering scenario
    • Execute both on-site and remote social engineering tests
    • Write an effective social engineering report
    • Learn about various tools, including software, hardware, and on-site tools
    • Defend your organization against social engineering attacks