Book description
Learn to identify the social engineer by non-verbal behavior
Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and demonstrates with visuals the connection of non-verbal behavior to social engineering and scamming.
Clearly combines both the practical and technical aspects of social engineering security
Reveals the various dirty tricks that scammers use
Pinpoints what to look for on the nonverbal side to detect the social engineer
Sharing proven scientific methodology for reading, understanding, and deciphering non-verbal communications, Unmasking the Social Engineer arms readers with the knowledge needed to help protect their organizations.
Table of contents
- Cover
- Foreword
- Acknowledgments and Preface
- Introduction
- Part I: Building the Foundation
- Part II: Decoding the Language of the Body
- Part III: Deciphering the Science
- Part IV: Putting It All Together
Product information
- Title: Unmasking the Social Engineer: The Human Element of Security
- Author(s):
- Release date: February 2014
- Publisher(s): Wiley
- ISBN: 9781118608579
You might also like
book
The Art of Deception: Controlling the Human Element of Security
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security …
book
Social Engineering in IT Security: Tools, Tactics, and Techniques
Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything [you] need …
book
Transformational Security Awareness
Expert guidance on the art and science of driving secure behaviors Transformational Security Awareness empowers security …
book
Cybersecurity and Third-Party Risk
STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN Across the world, the networks of hundreds of …