id author title date pages extension mime words sentence flesch summary cache txt ital-3355 Thompson, Samuel T. C. Helping the Hacker? Library Information, Security, and Social Engineering 2006-12-01 4 .pdf application/pdf 3015 182 62 Impersonation Because forming trust relationships with their victims is critical to a social- engineering attack, it is not surprising that social engineers often pretend to be someone or something that they are not. Research To establish trust in their victims, social engineers use research as a tool. cache/ital-3355.pdf txt/ital-3355.txt