Social Engineering: The Science of Human Hacking 2nd Edition
Written by Christopher Hadnagy
Narrated by Christopher Hadnagy
4.5/5
()
About this audiobook
Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks.
Christopher Hadnagy
Christopher Hadnagy is a global security expert and master hacker. He is the founder and CEO of Social-Engineer, LLC, the creator of the popular Social Engineer Podcast, website, and newsletter, and designed “Advanced Practical Social Engineering,” the first hands-on social engineering training course and certification for law enforcement, military, and private sector professionals. He is also the first (adjunct) professor of social engineering for the University of Arizona, one of the NSA-designated Centers of Academic Excellence in Cyber Operations. Hadnagy is the creator of the Human Hacking Conference, an annual conference focused on training people who to hack themselves to achieve their goals. A highly sought-after writer and speaker, he has spoken at events such as RSA and Black Hat and given numerous presentations for corporate, government, and military clients. He is the bestselling author of four technical books for security professionals: Social Engineering: The Art of Human Hacking; Unmasking the Social Engineer: The Human Element of Security; Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails; and Social Engineering: The Science of Human Hacking, which is now in its second edition. He is also the founder, executive director, and board member of the Innocent Lives Foundation, a nonprofit that fights the sexual abuse of children.
More audiobooks from Christopher Hadnagy
Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You Rating: 5 out of 5 stars5/5Social Engineering: The Art of Human Hacking Rating: 5 out of 5 stars5/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails Rating: 4 out of 5 stars4/5
Related to Social Engineering
Related audiobooks
HACKING: Social Engineering Attacks, Techniques & Prevention Rating: 5 out of 5 stars5/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5The Art of Attack: Attacker Mindset for Security Professionals Rating: 5 out of 5 stars5/5Cybersecurity Program Development for Business: The Essential Planning Guide Rating: 5 out of 5 stars5/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5The Like Switch: An Ex-FBI Agent's Guide to Influencing, Attracting, and Winning People Over Rating: 5 out of 5 stars5/5Find Out Anything from Anyone, Anytime: Secrets of Calculated Questioning From a Veteran Interrogator Rating: 4 out of 5 stars4/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5How I Rob Banks: And Other Such Places Rating: 4 out of 5 stars4/5Ten Arguments for Deleting Your Social Media Accounts Right Now Rating: 4 out of 5 stars4/5Outfox the Fox: Understanding Manipulation: Learn the Hidden Secrets of Power and Influence Rating: 5 out of 5 stars5/5Technically Wrong: Sexist Apps, Biased Algorithms, and Other Threats of Toxic Tech Rating: 4 out of 5 stars4/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5The Smartest Person in the Room Rating: 5 out of 5 stars5/5Facing Cyber Threats Head On: Protecting Yourself and Your Business Rating: 5 out of 5 stars5/5Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien" Rating: 4 out of 5 stars4/5Becoming an Ethical Hacker Rating: 5 out of 5 stars5/5Spam Nation: The Inside Story of Organized Cybercrime—from Global Epidemic to Your Front Door Rating: 4 out of 5 stars4/5Cryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Rating: 4 out of 5 stars4/5HACKING: 3 BOOKS IN 1 Rating: 5 out of 5 stars5/5Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity Rating: 5 out of 5 stars5/5CYBERSECURITY and CYBERWAR: Gain the Experience to Navigate Critical Cybersecurity Challenges Rating: 0 out of 5 stars0 ratingsHacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Rating: 4 out of 5 stars4/5Cybersecurity: The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks Rating: 4 out of 5 stars4/5HACKING: How to Hack Web Apps Rating: 5 out of 5 stars5/5
Internet & Web For You
YouTube Channels For Dummies: 2nd Edition Rating: 5 out of 5 stars5/530 Passive Income Ideas Rating: 4 out of 5 stars4/5The Darkest Web: Drugs, Death and Destroyed Lives . . . the Inside Story of the Internet's Evil Twin Rating: 4 out of 5 stars4/5Ten Arguments for Deleting Your Social Media Accounts Right Now Rating: 4 out of 5 stars4/5How to Be Fine: What We Learned by Living by the Rules of 50 Self-Help Books Rating: 4 out of 5 stars4/5SEO 2021: Learn search engine optimization with smart internet marketing strategies Rating: 5 out of 5 stars5/5Podcasting for Dummies: 4th Edition Rating: 5 out of 5 stars5/5What is the Dark Web?: The truth about the hidden part of the internet Rating: 4 out of 5 stars4/5The YouTube Formula: How Anyone Can Unlock the Algorithm to Drive Views, Build an Audience, and Grow Revenue Rating: 5 out of 5 stars5/5The Dark Net: Inside the Digital Underworld Rating: 4 out of 5 stars4/5Invisibility Toolkit Rating: 5 out of 5 stars5/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5Who Owns the Future? Rating: 4 out of 5 stars4/5AWS: The Complete Beginner to Advanced Guide for Amazon Web Service — The Ultimate Tutorial Rating: 5 out of 5 stars5/5How to Start a Podcast: An Essential Guide to Profitable Podcasting for Beginners Rating: 5 out of 5 stars5/5Stop Checking Your Likes: Shake Off the Need for Approval and Live an Incredible Life Rating: 4 out of 5 stars4/5Darknet: A Beginner's Guide to Staying Anonymous Online Rating: 5 out of 5 stars5/5Web3: Charting the Internet's Next Economic and Cultural Frontier Rating: 0 out of 5 stars0 ratingsNine Algorithms That Changed the Future: The Ingenious Ideas That Drive Today's Computers Rating: 5 out of 5 stars5/5How to Do Nothing: Resisting the Attention Economy Rating: 4 out of 5 stars4/5The Wires of War: Technology and the Global Struggle for Power Rating: 4 out of 5 stars4/5Platform: Get Noticed in a Noisy World Rating: 4 out of 5 stars4/5Blog, Inc.: Blogging for Passion, Profit, and to Create Community Rating: 4 out of 5 stars4/5Make Noise: A Creator's Guide to Podcasting and Great Audio Storytelling Rating: 5 out of 5 stars5/5A Body to Love: Cultivate Community, Body Positivity, and Self-Love in the Age of Social Media Rating: 4 out of 5 stars4/5Podcast: The Ultimate Guide To Podcasting Rating: 5 out of 5 stars5/5
Reviews for Social Engineering
38 ratings2 reviews
- Rating: 4 out of 5 stars4/5Great guide on starting to become a Social Engineer and, more pertinent for me, how to defend against attacks. Was a great read with interesting anecdotes throughout. I'm only giving 5 stars because I wish the author shared some open source alternatives to some of the tools he recommended.
- Rating: 1 out of 5 stars1/5Im interested in a book on this topic but this isnt even accurate.. jeet kune do isnt an ancient chinese martial art its one bruce lee invented.. do some edi