Influence: Science and Practice (5th Edition)

Influence: Science and Practice (5th Edition)

Influence: Science and Practice is an examination of the psychology of compliance (i.e. uncovering which factors cause a person to say “yes” to another’s request).

 

Written in a narrative style combined with scholarly research, Cialdini combines evidence from experimental work with the techniques and strategies he gathered while working as a salesperson, fundraiser, advertiser, and in other positions inside organizations that commonly use compliance tactics to get us to say “yes.” Widely used in classes, as well as sold to people operating successfully in the business world, the eagerly awaited revision of Influence reminds the reader of the power of persuasion.

 

Cialdini organizes compliance techniques into six categories based on psychological principles that direct human behavior: reciprocation, consistency, social proof, liking, authority, and scarcity.

List price: $38.00

Buy from amazon.com

Who’s Pulling Your Strings?: How to Break the Cycle of Manipulation and Regain Control of Your Life

Who's Pulling Your Strings?: How to Break the Cycle of Manipulation and Regain Control of Your Life

A powerful program to stop manipulators in their tracks

In Who’s Pulling Your Strings?, Dr. Harriet B. Braiker, New York Times bestselling author of The Disease to Please, explains how depression, low self-esteem, anger, and feelings of helplessness can be caused by relationships with manipulative people. She exposes the most common methods of manipulators, and with the help of selfassessment quizzes, action plans, and how-to exercises, she helps you recognize and end the manipulative cycle for good.

List price: $22.00

Buy from amazon.com

Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft

Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft

Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures. Showing you how phishing attacks have been mounting over the years, how to detect and prevent current as well as future attacks, this text focuses on corporations who supply the resources used by attackers. The authors subsequently deliberate on what action the government can take to respond to this situation and compare adequate versus inadequate countermeasures.

List price: $122.00

Buy from amazon.com

How to Hypnotise Anyone – Confessions of a Rogue Hypnotist

How to Hypnotise Anyone - Confessions of a Rogue Hypnotist

The number 1 Amazon kindle bestseller on hypnosis is now available in paperback! Finally the hidden secrets of hypnosis unveiled! Did you know that the likelihood is at some point today you have been hypnotised!? Did you ever watch those magician’s secrets shows? At last a book that gives away all the secrets of hypnosis! And most hypnotists don’t know them! You will learn how to hypnotise like a professional! This is a book that will give you THE hypnosis scripts copyright free to keep and use for fun, stage hypnosis or therapy! If you have a voice you can hypnotise someone with words alone! A 100% fail proof method! Who is the Rogue Hypnotist? The Rogue Hypnotist is a top UK hypnotherapist and NLP Master Practitioner working in London, England. He has helped multimillionaires, heads of advertising agencies, top chefs, top racing car drivers, psychotherapists and councillors, law firm associates, film studio owners, Sky TV presenters, journalists, nurses, commodity traders, stock brokers, architects, teachers, sports organisation presidents, waiters, painters and decorators, 16-90 years olds from all over the world. He has an amazing success rate and can help clients in just 1, 1 hour session 99.9% of the time. He wants you to be able to do the same! Novice and expert will benefit from the ‘hypno-tricks’ within! He remains anonymous for his own reasons… ‘How to hypnotise anyone’ is a practical ‘how to’ book that will reveal to you: 1. What hypnosis really is. 2. What trance really is. 3. What the subconscious really is and how to speak to it. 4. What the basic principles of successful hypnotic inductions really are. 5. 2 quick and fun deepeners that will send people through the floor! 6. How to really get genuine rapport so people trust you. 7. Learn the true language of hypnosis. 8. How to have a great hypnotic voice. 9. How to be authoritative without being arrogant. 10. What the ‘moment of hypnotic surrender’ is. 11. What embedded commands to use and how to deliver them. 12. Learn how to spot the signs of hypnosis that others hypnosis ‘experts’ don’t teach. 13. Learn the ‘Pleasure Deepener’ – the best hypnotic convincer there is. 14. Learn how the media, TV and politicians use hypnotic principles on YOU! 15. NLP and hypnosis myths will be trashed! Why you need this book. The facts that the so-called ‘elite’ self-help gurus don’t want you to know are in this book! Knowledge is power! This engaging book will teach you exactly how to hypnotise anyone even if you’ve never done it before! Guaranteed! Unlike the self-help establishment the Rogue Hypnotist is not asking you to pay thousands of pounds or attend boring 4 week lectures to learn the essential skills of hypnosis. He is virtually giving away his secrets for free! It’s time the truth was known! Your hypnosis confidence is just a click away!

List price: $6.99

Buy from amazon.com

Email Forensics: Eliminating Spam, Scams and Phishing

Email Forensics: Eliminating Spam, Scams and Phishing

This is the first book of its kind to document the detailed application of forensic analysis techniques to the field of e-mail security. Both investigative and preventative techniques are described but the focus is on prevention.

The world has been subjected to an increasing wave of spam and more recently, scamming and phishing attacks in the last twenty years. Such attacks now include industrial espionage and government-sponsored spying. The volume and sophistication of such attacks has rendered existing technologies only partially effective leaving the end-user vulnerable and the number of successful attacks is increasing.

The seeds of this book were sown three years ago when the author, a Professor of Forensic Software Engineering, was trying to recover his 20 year-old e-mail address from the clutches of spammers who had rendered it almost unusable with more than 140,000 junk messages a day. It got to the point where he was invited by his ISP to either change it or take it elsewhere. Instead he decided to find out how to prevent the deluge, acquired his own servers and began researching.

The book is a mixture of analysis, experiment and implementation in almost equal proportions with detailed description of the defence in depth necessary to turn the tidal wave of junk aside leaving only what the end user wants to see – no more and no less. It covers:-

  • 1. The rise of e-mail
  • 2. How it all works
  • 3. Scams, spam and other abuse
  • 4. Protection: the principles of filtering
  • 5. Going deeper: setting up a mail server
  • 6. Advanced content filtering
  • 7. The bottom line – how well can we do ?
  • 8. Where is all this going ?
There is something here for everyone. Chapters 1-4 are suitable for the general reader who just wants to understand how spammers and scammers work and find out a little more about the many forms of attack. Chapters 5 and 6 are highly technical and suitable for both e-mail administrators and theoreticians and include a discussion of the latest computational and mathematical techniques for detecting textual patterns. Chapter 7 presents the results of applying the techniques in this book on the several million junk messages the author’s servers received over a 10 month period. Chapter 8 tries to see into the future a little to predict how the arms race between the attackers and defenders might go. Finally, those interested in governance will find discussions of the dangers of release of e-mail addresses under Freedom of Information Requests.

The book contains many illustrations of attacks and is supported by numerous code examples in Perl and C.

Perfection is impossible, but if you follow the advice in this book, you can build mail systems which provably make no more than 5 mistakes per million messages received, very close to the definitive manufacturing standard of six sigma. The threat from viruses effectively disappears and the e-mail user is secured from toxic content.

List price: $39.99

Buy from amazon.com