Footnote:
Includes index. - Description based on print version record and CIP data provided by publisher; resource not viewed
Description:
"This book explains how attackers leverage human psychology and publicly available information to target and exploit victims, and outlines ways to defend against social engineering attacks. It explores the ethical decision-making process of the social engineer when implementing a phishing engagement. Includes case studies throughout"--