Acknowledgments
I couldn’t have written this book without the input of my good friend and technical reviewer, Eireann Leverett. I met Eireann when I was presenting at a security conference in Luxembourg. I put a photo of Victor Lustig in my slide deck, and when Eireann’s eyes lit up on seeing it, I knew we were kindred spirits. Both Eireann and I are fascinated by deception in all its forms, from social engineering to magic, freaks, and geeks, and circus performers. I knew he would be the perfect person to review my book. Thanks Eireann. Every time we talk I end up with a new list of research topics. I have a feeling that will continue even after this book has been published. I am looking forward to many more conversations about con artists, ...

Get Social Engineering in IT Security: Tools, Tactics, and Techniques now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.