Your Ad Here

Wednesday, August 22, 2007

The Art of Deception


We humans are born with an inner drive to explore the nature of our surroundings. As young men, both Kevin Mitnick and I were intensely curious about the world and eager to prove ourselves. We were rewarded often in our attempts to learn new things, solve puzzles, and win at games. But at the same time, the world around us taught us rules of behavior that constrained our inner urge toward free exploration. For our boldest scientists and technological entrepreneurs, as well as for people like Kevin Mitnick, following this inner urge offers the greatest thrills, letting us accomplish things that others believe cannot be done.

The Art of Deception shows how vulnerable we all are - government, business, and each of us personally - to the intrusions of the social engineer. In this security-conscious era, we spend huge sums on technology to protect our computer networks and data.

This book points out how easy it is to trick insiders and circumvent all this technological protection. Whether you work in business or government, this book provides a powerful road map to help you understand how social engineers work and what you can do to foil them. Using fictionalized stories that are both entertaining and eye-opening, Kevin and co-author Bill Simon bring to life the techniques of the social engineering underworld. After each story, they offer practical guidelines to help you guard against the breaches and threats they're described.

Technological security leaves major gaps that people like Kevin can help us close. Read this book and you may finally realize that we all need to turn to the Mitnick's among us for guidance.

TABLE OF CONTENT:
Chapter 01 - Security's Weakest Link
Chapter 02 - When Innocuous information Isn't
Chapter 03 - The Direct Attack: Just Asking for it
Chapter 04 - Building Trust
Chapter 05 - "Let Me Help You"
Chapter 06 - "Can You Help Me?"
Chapter 07 - Phony Sites and Dangerous Attachments
Chapter 08 - Using Sympathy, Guilt and Intimidation
Chapter 09 - The Reverse Sting
Chapter 10 - Entering the Premises
Chapter 11 - Combining Technology and Social Engineering
Chapter 12 - Attacks on the Entry-Level Employee
Chapter 13 - Clever Cons
Chapter 14 - Industrial Espionage
Chapter 15 - Information Security Awareness and Training
Chapter 16 - Recommended Corporate Information Security Policies

Download Link:
http://tinyurl.com/2gqxfr

Rar pass: www.ebooksdb.com

No comments: