Review From User :
This book is far from perfect, but it is the best book I've found on how-to social engineering as an overall field vs either a bunch of case studies or narrow guides to specific techniques. The biggest problem was using the same set of examples to illustrate multiple ostensibly distinct techniques - admittedly a lot of the distinctions were arbitrary to begin with - and the structure of the book wasn't as clear as it could be. However, this book (and the author's other resources on the Internet) are great resources for interested individuals, non-SE security people, or administrators.
Media Size : 6.1 MB