Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
192 Chapter 5 • Hacking Techniques and Tools
the party he’s contacting.The attacker may even use a voice changer to
impersonate an older adult or even someone of the opposite sex.
Curiously enough, women commit some of the most successful
social engineering attacks. It seems that most people are inclined to
regard an unrecognized male caller with more suspicion than they
would accord a female caller. Sexist as it may sound, societal expectations
are that women are more innocent; they are also presumed to under-
stand technology less, even to the point of handing information to them
on the canonical silver platter. Even supposedly hack-savvy giants like ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312