This resource is no longer available
This extract from Sharon Conheady’s book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how organisations can protect themselves from physical and cyber attacks.
This book is for security professionals who are interested in performing ethical social engineering tests and for anybody who is interested in how social engineering works. By understanding the steps that social engineers take, readers will be better able to defend against them.