Similar Items
- 
                
                    Social media security : leveraging social networking while mitigating risk /        
                  
by: Cross, Michael, 1965-
Published: (2013) - 
                
                    Theoretical and experimental methods for defending against DDoS attacks /        
                  
by: Reza Khalifeh Soltanian, Mohammad, et al.
Published: (2016) - 
                
                    Windows registry forensics : advanced digital forensic analysis of the Windows registry /        
                  
by: Carvey, Harlan A.
Published: (2016) - 
                
                    Investigating the awareness of social engineering on current and future employees        
                  
by: Madzikanda, Felex, et al.
Published: (2016) - 
                
                    Enhanced social engineering framework mitigating against social engineering attacks in higher education        
                  
by: Matyokurehwa, Kanos, et al.
Published: (2022) 
Social engineering penetration testing : executing social engineering pen tests, assessments and defense /
This book gives the practical methodology needed to plan and execute a social engineering penetration test and assessment. It has insights into how social engineering techniques--including email phishing, telephone pretexting, and physical vectors--can be used to elicit information or manipulate ind...
        Saved in:
      
    
          | Main Authors: | Watson, Gavin (Author), Mason, Andrew (Author), Ackyord, Richard (Author) | 
|---|---|
| Format: | Book | 
| Language: | English | 
| Published: | 
      Oxford:
        
      Elsevier,    
    
      2014
     | 
| Subjects: | |
| Tags: | 
       Add Tag    
     
      No Tags, Be the first to tag this record!
   
 | 
