Privacy Tactics Masthead  
location on site: home > book support > SOCIAL HACKING (SOCIAL ENGINEERING)
spacer

Privacy Tactics Book Cover

SOCIAL HACKING (ALSO KNOWN AS SOCIAL ENGINEERING)

The following links may be useful all on their own, but are offered primarily as a convenience for readers of the print book Privacy Tactics. These are the links from the chapter Additional Resource sections.

Link Disclaimer: These links are those found in the Additional Resource sections of the Privacy Tactics book. (Possibly with updates where appropriate.) Except where otherwise noted, these links lead off this site. They're here for the convenience of readers. No endorsement is made or should be implied unless explicitly stated. Nor can we accept responsibility for their content. If you find anything that seems overly objectionable, and believe we should not link to their site, let us know and we'll re-examine that site's value to our goals.

spacer

SANS InfoSec Reading Room
Many papers on computer security, including social hacking. Note: this site uses .pdf files embedded in a web page. It may not work for some browsers.
www.sans.org/rr

SecurityFocus
A true and truly scary story about a real life social hack test. If you think it was a fluke, check the links at the bottom of the page for more.
www.securityfocus.com/infocus/1527

Computer Emergency Response Team (CERT)
Advisory on social engineering
www.cert.org/advisories/CA-1991-04.html

University of Dayton School of Law
Definitions and descriptions of several forms of computer crime.
cybercrimes.net

Top of Page Top of Page
spacer

 

bullet off graphicOrder now from JustBookz!

spacer
Enter Privacy Tactics Additional ResourcesEnter Privacy Tactics Additional Resources links online...
spacer
privacy policy :: customer service :: media :: booksellers/wholesalers :: partners :: contact
Privacy Tactics Bottom Logo