๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

The Art of Human Hacking


Book ID
104472614
Tongue
English
Weight
9 MB
Category
Fiction
ISBN
1118029747

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


cover
โœ Hadnagy, Christopher ๐Ÿ“‚ Fiction ๐Ÿ“… 2010 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 923 KB

### Product Description **The first book to reveal and dissect the technical aspect of many social engineering maneuvers** From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal exp

cover
โœ Hadnagy, Christopher ๐Ÿ“‚ Fiction ๐Ÿ“… 2010 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 923 KB

### Product Description **The first book to reveal and dissect the technical aspect of many social engineering maneuvers** From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal exp

cover
โœ Jon Erickson ๐Ÿ“‚ Fiction ๐Ÿ“… 2008 ๐Ÿ› No Starch Press ๐ŸŒ en-GB โš– 335 KB ๐Ÿ‘ 4 views

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than me

cover
โœ Erickson, Jon ๐Ÿ“‚ Fiction ๐Ÿ“… 2010 ๐Ÿ› No Starch Press ๐ŸŒ en-GB โš– 494 KB

While other books merely show how to run existing exploits, *Hacking: The Art of Exploitation* broke ground as the first book to explain how hacking and software exploits work and how readers could develop and implement their own. In the extensively updated and expanded second edition, author Jon Er

cover
โœ Erickson, Jon ๐Ÿ“‚ Fiction ๐Ÿ“… 2010 ๐Ÿ› No Starch Press ๐ŸŒ English โš– 494 KB

While other books merely show how to run existing exploits, *Hacking: The Art of Exploitation* broke ground as the first book to explain how hacking and software exploits work and how readers could develop and implement their own. In the extensively updated and expanded second edition, author Jon Er