Table Of Contents
Foreword
Chapter 1:
Foot In The Door Technique
Chapter 2:
Cognitive Discomfort
Chapter 3:
The Low Ball Strategy
Chapter 4:
Recipro......
Features
Illustrates more than 75 key security concepts with short, easy-to-understand descriptions
Explains the concepts behind todays most prevalent...
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security...