Index
Table of Contents
Foreword p. vii
Preface p. ix
Introduction p. xv
Part 1 Behind the Scenes p. 1
Chapter 1 Security's Weakest Link p. 3
Part 2 The Art of the Attacker p. 13
Chapter 2 When Innocuous Information Isn't p. 15
Chapter 3 The Direct Attack: Just Asking for It p. 31
Chapter 4 Building Trust p. 41
Chapter 5 "Let Me Help You" p. 55
Chapter 6 "Can You Help Me?" p. 77
Chapter 7 Phony Sites and Dangerous Attachments p. 93
Chapter 8 Using Sympathy, Guilt, and Intimidation p. 105
Chapter 9 The Reverse Sting p. 133
Part 3 Intruder Alert p. 147
Chapter 10 Entering the Premises (...read more)