Social Engineering Resources URL: http://billslater.com/socialengineering_references.txt Last Updated on September 1, 2012 William Favre Slater, III M.S. in Cybersecurity, Bellevue University, 2013 slater@billslater.com http://billslater.com/interview http://billslater.com/ms_cybersecurity http://billslater.com/wfs_contact.txt Chicago, IL United States of America ================================================================= Allsopp, W. (2009). Unauthorized Access: Physical Penetration Testing for IT Security Test Teams. West Sussex, U.K.: Wiley Publishing. Ariely, D. (2008). Predictably Irrational: The Hidden Forces that Shape Our Decisions. New York, NY: Harper Perennial. Brancik, K. (2008). Insider Computer Fraud: An In-Depth Framework for Detecting and Defending Against Insider IT Attacks. Boca Raton, FL: Auerbach Publications. Carnegie, D. (1981). How to Win Friends and Influence People, Retrieved from the web at http://erudition.mohit.tripod.com/_Influence_People.pdf on May 4, 2012. Cialdini, R. B. (2009). Influence: Science and Practice, fifth edition. Boston, MA: Pearson Education. Cole, E. and Ring, S. (2006). Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Present Employees and Contractors from Stealing Corporate Data. Rockland, MA: Syngress Publishing, Inc. Fennelly, L. J. (2004). Effective Physical Security, third edition. Burlington, MA: Elsevier. Fisher, R., Ury, W. and Patton, B. (2011). Getting to Yes: Negotiating Agreement without Giving In, revised edition. New York, NY: Penguin. Guerin, J. (2010). The Essential Guide to Workplace Investigations: How to Handle Employee Complaints & Problems. Berkeley, CA: Nolo. Hadnagy, C. (2011). Social Engineering: The Art of Human Hacking. Indianapolis, IN: Wiley Publishing, Inc. Influence at Work. (2011). My YES score: Retrieved from the web at http://www.myyesscore.com/ on April 27, 2012. Lidwell, W., et al. (2003). Universal Principles of Design: 125 Ways to Enhance Usability, Influence Perception, Increase Appeal, Make Better Design Decisions. Beverly, MA: Rockport Publishers. Long, J., et al. (2008). Google Hacking for Penetration testers, Volume 2. Burlington, MA: Syngress Publishing, Inc. Long, J., et al. (2008). No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing. Burlington, MA: Syngress Publishing, Inc. Middleton, B. (2005). Cyber Crime Investigator’s Field Guide, second edition. Boca Raton, FL: Auerbach Publications. Mitnick, K. and Simon, W. (2002). The Art of Deception: Controlling the Human Element Security. Indianapolis, IN: Wiley Publishing, Inc. Mitnick, K. and Simon, W. (2006). The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers. Indianapolis, IN: Wiley Publishing, Inc. Mutch, J. and Anderson, B. (2011). Preventing Good People from Doing Bad Things: Implementing Least Privilege. New York, NY: Apress. Parker, T., et al. (2004). Cyber Adversary Characterization: Auditing the Hacker Mind. Rockland, MA: Syngress Publishing, Inc. Raiffa, H. (1982). The Art and Science of Negotiation: How to Resolve Conflicts and Get the Best out of Bargaining. Cambridge, MA: The Belknap Press of Harvard University Press. Schneier, B. (2008). Psychology of Security. An article published at Schneier.com on January 18, 2008. Retrieved from the web at http://www.schneier.com/essay-155.html on March 13, 2012. Schneier, B. (2012). Liars & Outliers: Enabling the Trust That Society Needs to Thrive. Indianapolis, IN: John Wiley and Sons, Inc. Sinek, S. (2009). Simon Sinek’s book, Start with Why: How Great Leaders Inspire Everyone to Take Action. New York, NY: Portfolio. TED. (2009). Simon Sinek: How Great Leaders Inspire Action. A film posted on TED.com in May 2010. Retrieved from the web at http://www.ted.com/talks/simon_sinek_how_great_leaders_inspire_action.html on October 10, 2011. Wiles, J., et al. (2007). Low Techno Security’s Guide to Managing Risks: For IT Managers, Auditors, and Investigators. Burlington, MA: Syngress Publishing, Inc. Wiles, J., et al. (2012). Low Tech Hacking: Street Smarts for Security Professionals. Waltham, MA: Syngress Publishing, Inc. Wilhelm, T. and Andress, J. (2011). Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques. Burlington, MA: Syngress Publishing, Inc. Ury, W. (1993). Getting Past No: Negotiating in Difficult Situations. New York, NY: Bantum.