語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Social engineering cookbook : = 100 recipes for OSINT, NLP, and digital footprinting in advanced security strategies /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Social engineering cookbook :/ Manish Sharma.
其他題名:
100 recipes for OSINT, NLP, and digital footprinting in advanced security strategies /
作者:
Sharma, Manish.
面頁冊數:
1 online resource (413 pages)
標題:
COMPUTERS / Social Aspects. -
電子資源:
https://portal.igpublish.com/iglibrary/search/BPB0000780.html
ISBN:
9789365891447
Social engineering cookbook : = 100 recipes for OSINT, NLP, and digital footprinting in advanced security strategies /
Sharma, Manish.
Social engineering cookbook :
100 recipes for OSINT, NLP, and digital footprinting in advanced security strategies /Manish Sharma. - 1 online resource (413 pages)
Includes bibliographical references and index.
Social engineering cookbook : 100 recipes for OSINT, NLP, and digital footprinting in advanced security strategies -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Table of Contents -- Chapter 1. Social Engineering Explained -- Chapter 2. The Psychology of Social Engineering -- Chapter 3. Advanced Information Gathering Techniques via Search Engines -- Chapter 4. Expanding OSINT Capabilities with Advanced Tools -- Chapter 5. Uncovering Email Trails and People Digital Footprinting -- Chapter 6. The Execution and Delivery of Social Engineering -- Chapter 7. Advanced and Cutting- Edge Techniques of Social Engineering -- Chapter 8. Case Studies and Lessons Learned -- Chapter 9. Digital and Online Aspects of Social Engineering -- Chapter 10. Organizational and Business Implications of Social Engineering -- Chapter 11. Legal and Regulatory Landscape of Social Engineering -- Chapter 12. Future and Emerging Trends of Social Engineering -- Chapter 13. Positive and Ethical Applications of Social Engineering -- Index.
Access restricted to authorized users and institutions.
Social engineering can be the most dangerous and effective type of hacking because the human component is notoriously the weakest link in the security chain. This Social Engineering Cookbook encompasses a blend of theoretical and practical knowledge that focuses on psychological manipulation of people to gain confidential information and to protect yourself from such attacks. In this book, you will learn how to anticipate the moves of social engineers, what tools they use, and how they use the art of deception for personal gain. You will master information gathering with search engines and specialized tools, learn to analyze email trails, and understand the execution of various social engineering attacks. Advanced techniques like micro-expression reading and NLP are explored, alongside real-world case studies to illustrate potential risks. Finally, it examines emerging trends like AI manipulation and ethical applications of these techniques. By mastering the recipes and techniques outlined in this Social Engineering Cookbook, readers will be empowered to recognize, defend against, and ethically utilize social engineering tactics, transforming them into vigilant defenders in their personal and professional lives. By the end of this book, you will learn how to hack the human mind and protect yourself from manipulation. WHAT YOU WILL LEARN ● Define social engineering, analyze psychology, identify vulnerabilities, conduct OSINT, and execute advanced techniques. ● Master OSINT tools, email analysis, digital footprinting, and understand attack execution. ● Explore pretexting, NLP, mitigate online threats, and grasp legal implications. ● Implement security measures, analyze case studies, understand AI's impact, and ethical use. ● Utilize Maltego, HTTrack, analyze email headers, and apply emotional manipulation tactics. ● Conduct website footprinting, learn deepfake detection, and implement incident response. ● Automate data collection, master credential harvesting, and understand regulatory compliance. ● Explore micro-expressions, use SET, analyze social media OSINT, and counter biohacking. ● Implement multi-factor authentication, conduct penetration tests, and understand cyber warfare. WHO THIS BOOK IS FOR This Social Engineering Cookbook is for anyone seeking to understand social engineering, from beginners to experienced professionals like security personnel, ethical hackers, and penetration testers, as well as individuals aiming to enhance their security awareness.
Mode of access: World Wide Web.
ISBN: 9789365891447Subjects--Topical Terms:
1483860
COMPUTERS / Social Aspects.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Social engineering cookbook : = 100 recipes for OSINT, NLP, and digital footprinting in advanced security strategies /
LDR
:04590nam a2200289 i 4500
001
1157359
006
m eo d
007
cr cn |||m|||a
008
250717s2025 ob 000 0 eng d
020
$a
9789365891447
020
$a
9789365894097
035
$a
BPB0000780
041
0
$a
eng
050
0 0
$a
QA76.9.A25
082
0 0
$a
005.8
100
1
$a
Sharma, Manish.
$3
1208910
245
1 0
$a
Social engineering cookbook :
$b
100 recipes for OSINT, NLP, and digital footprinting in advanced security strategies /
$c
Manish Sharma.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2025.
264
4
$c
©2025
300
$a
1 online resource (413 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Social engineering cookbook : 100 recipes for OSINT, NLP, and digital footprinting in advanced security strategies -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Table of Contents -- Chapter 1. Social Engineering Explained -- Chapter 2. The Psychology of Social Engineering -- Chapter 3. Advanced Information Gathering Techniques via Search Engines -- Chapter 4. Expanding OSINT Capabilities with Advanced Tools -- Chapter 5. Uncovering Email Trails and People Digital Footprinting -- Chapter 6. The Execution and Delivery of Social Engineering -- Chapter 7. Advanced and Cutting- Edge Techniques of Social Engineering -- Chapter 8. Case Studies and Lessons Learned -- Chapter 9. Digital and Online Aspects of Social Engineering -- Chapter 10. Organizational and Business Implications of Social Engineering -- Chapter 11. Legal and Regulatory Landscape of Social Engineering -- Chapter 12. Future and Emerging Trends of Social Engineering -- Chapter 13. Positive and Ethical Applications of Social Engineering -- Index.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
Social engineering can be the most dangerous and effective type of hacking because the human component is notoriously the weakest link in the security chain. This Social Engineering Cookbook encompasses a blend of theoretical and practical knowledge that focuses on psychological manipulation of people to gain confidential information and to protect yourself from such attacks. In this book, you will learn how to anticipate the moves of social engineers, what tools they use, and how they use the art of deception for personal gain. You will master information gathering with search engines and specialized tools, learn to analyze email trails, and understand the execution of various social engineering attacks. Advanced techniques like micro-expression reading and NLP are explored, alongside real-world case studies to illustrate potential risks. Finally, it examines emerging trends like AI manipulation and ethical applications of these techniques. By mastering the recipes and techniques outlined in this Social Engineering Cookbook, readers will be empowered to recognize, defend against, and ethically utilize social engineering tactics, transforming them into vigilant defenders in their personal and professional lives. By the end of this book, you will learn how to hack the human mind and protect yourself from manipulation. WHAT YOU WILL LEARN ● Define social engineering, analyze psychology, identify vulnerabilities, conduct OSINT, and execute advanced techniques. ● Master OSINT tools, email analysis, digital footprinting, and understand attack execution. ● Explore pretexting, NLP, mitigate online threats, and grasp legal implications. ● Implement security measures, analyze case studies, understand AI's impact, and ethical use. ● Utilize Maltego, HTTrack, analyze email headers, and apply emotional manipulation tactics. ● Conduct website footprinting, learn deepfake detection, and implement incident response. ● Automate data collection, master credential harvesting, and understand regulatory compliance. ● Explore micro-expressions, use SET, analyze social media OSINT, and counter biohacking. ● Implement multi-factor authentication, conduct penetration tests, and understand cyber warfare. WHO THIS BOOK IS FOR This Social Engineering Cookbook is for anyone seeking to understand social engineering, from beginners to experienced professionals like security personnel, ethical hackers, and penetration testers, as well as individuals aiming to enhance their security awareness.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / Social Aspects.
$2
bisacsh
$3
1483860
650
7
$a
COMPUTERS / Internet / Online Safety & Privacy.
$2
bisacsh
$3
1483832
650
7
$a
COMPUTERS / Security / General.
$2
bisacsh
$3
1483863
650
7
$a
COMPUTERS / Information Technology.
$2
bisacsh
$3
1057148
655
4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000780.html
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入