Social Engineering: The Science of Human Hacking 2nd Edition
Written by Christopher Hadnagy
Narrated by Christopher Hadnagy
4.5/5
()
About this audiobook
Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks.
Christopher Hadnagy
Christopher Hadnagy is a global security expert and master hacker. He is the founder and CEO of Social-Engineer, LLC, the creator of the popular Social Engineer Podcast, website, and newsletter, and designed “Advanced Practical Social Engineering,” the first hands-on social engineering training course and certification for law enforcement, military, and private sector professionals. He is also the first (adjunct) professor of social engineering for the University of Arizona, one of the NSA-designated Centers of Academic Excellence in Cyber Operations. Hadnagy is the creator of the Human Hacking Conference, an annual conference focused on training people who to hack themselves to achieve their goals. A highly sought-after writer and speaker, he has spoken at events such as RSA and Black Hat and given numerous presentations for corporate, government, and military clients. He is the bestselling author of four technical books for security professionals: Social Engineering: The Art of Human Hacking; Unmasking the Social Engineer: The Human Element of Security; Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails; and Social Engineering: The Science of Human Hacking, which is now in its second edition. He is also the founder, executive director, and board member of the Innocent Lives Foundation, a nonprofit that fights the sexual abuse of children.
More audiobooks from Christopher Hadnagy
Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You Rating: 5 out of 5 stars5/5Social Engineering: The Art of Human Hacking Rating: 5 out of 5 stars5/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails Rating: 4 out of 5 stars4/5
Related to Social Engineering
Related audiobooks
Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5HACKING: Social Engineering Attacks, Techniques & Prevention Rating: 5 out of 5 stars5/5The Art of Attack: Attacker Mindset for Security Professionals Rating: 5 out of 5 stars5/5Cybersecurity Program Development for Business: The Essential Planning Guide Rating: 5 out of 5 stars5/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5The Like Switch: An Ex-FBI Agent's Guide to Influencing, Attracting, and Winning People Over Rating: 5 out of 5 stars5/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5How I Rob Banks: And Other Such Places Rating: 4 out of 5 stars4/5Outfox the Fox: Understanding Manipulation: Learn the Hidden Secrets of Power and Influence Rating: 5 out of 5 stars5/5Find Out Anything from Anyone, Anytime: Secrets of Calculated Questioning From a Veteran Interrogator Rating: 4 out of 5 stars4/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien" Rating: 4 out of 5 stars4/5Becoming an Ethical Hacker Rating: 5 out of 5 stars5/5HACKING: 3 BOOKS IN 1 Rating: 5 out of 5 stars5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5The Smartest Person in the Room Rating: 5 out of 5 stars5/5The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Rating: 4 out of 5 stars4/5Facing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity Rating: 0 out of 5 stars0 ratingsHacking: The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 0 out of 5 stars0 ratingsSpam Nation: The Inside Story of Organized Cybercrime—from Global Epidemic to Your Front Door Rating: 4 out of 5 stars4/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5ETHICAL HACKING FOR BEGINNERS: HOW TO BUILD YOUR PEN TEST LAB FAST Rating: 4 out of 5 stars4/5Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Rating: 4 out of 5 stars4/5
Internet & Web For You
Ten Arguments for Deleting Your Social Media Accounts Right Now Rating: 4 out of 5 stars4/5The Art of Social Media: Power Tips for Power Users Rating: 4 out of 5 stars4/5The YouTube Formula: How Anyone Can Unlock the Algorithm to Drive Views, Build an Audience, and Grow Revenue Rating: 5 out of 5 stars5/5Platform: Get Noticed in a Noisy World Rating: 4 out of 5 stars4/5The Internet Con: How to Seize the Means of Computation Rating: 5 out of 5 stars5/5The Dark Net: Inside the Digital Underworld Rating: 4 out of 5 stars4/5How to Be Fine: What We Learned by Living by the Rules of 50 Self-Help Books Rating: 4 out of 5 stars4/5What is the Dark Web?: The truth about the hidden part of the internet Rating: 4 out of 5 stars4/5How to Do Nothing: Resisting the Attention Economy Rating: 4 out of 5 stars4/5Everybody Has a Podcast (Except You): A How-To Guide from the First Family of Podcasting Rating: 5 out of 5 stars5/5The Darkest Web: Drugs, Death and Destroyed Lives . . . the Inside Story of the Internet's Evil Twin Rating: 4 out of 5 stars4/5Nine Algorithms That Changed the Future: The Ingenious Ideas That Drive Today's Computers Rating: 5 out of 5 stars5/5Make Noise: A Creator's Guide to Podcasting and Great Audio Storytelling Rating: 5 out of 5 stars5/5How to Start a Podcast: An Essential Guide to Profitable Podcasting for Beginners Rating: 5 out of 5 stars5/5Kill All Normies: Online Culture Wars From 4Chan And Tumblr To Trump And The Alt-Right Rating: 4 out of 5 stars4/5Podcast: The Ultimate Guide To Podcasting Rating: 5 out of 5 stars5/5AWS: The Complete Beginner to Advanced Guide for Amazon Web Service — The Ultimate Tutorial Rating: 5 out of 5 stars5/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5Invisibility Toolkit Rating: 5 out of 5 stars5/5Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Rating: 4 out of 5 stars4/530 Passive Income Ideas Rating: 4 out of 5 stars4/5It Came from Something Awful: How a Toxic Troll Army Accidentally Memed Donald Trump into Office Rating: 5 out of 5 stars5/5A Body to Love: Cultivate Community, Body Positivity, and Self-Love in the Age of Social Media Rating: 4 out of 5 stars4/5Web3: Charting the Internet's Next Economic and Cultural Frontier Rating: 0 out of 5 stars0 ratingsAWS: The Most Complete Guide to Amazon Web Services from Beginner to Advanced Level Rating: 3 out of 5 stars3/5The Internet Is Not What You Think It Is: A History, a Philosophy, a Warning Rating: 4 out of 5 stars4/5
Reviews for Social Engineering
38 ratings2 reviews
- Rating: 4 out of 5 stars4/5Great guide on starting to become a Social Engineer and, more pertinent for me, how to defend against attacks. Was a great read with interesting anecdotes throughout. I'm only giving 5 stars because I wish the author shared some open source alternatives to some of the tools he recommended.
- Rating: 1 out of 5 stars1/5Im interested in a book on this topic but this isnt even accurate.. jeet kune do isnt an ancient chinese martial art its one bruce lee invented.. do some edi