Similar Items
-
Social engineering penetration testing : executing social engineering pen tests, assessments and defense /
by: Watson, Gavin, et al.
Published: (2014) -
Theoretical and experimental methods for defending against DDoS attacks /
by: Reza Khalifeh Soltanian, Mohammad, et al.
Published: (2016) -
Causes of social security contribution evasion in Zimbabwe
by: Rwafa, Livingstone T.
Published: (2017) -
An assessment of the feasibility to extend contributory social security scheme to the informal sector by National Social Security Authority
by: Tererai, Simukai Betserai Freedom
Published: (2019) -
The ‘socialness’ of online social media: Conversations with selected Midlands State University students.
by: Moyo, Vanessa Y.
Published: (2020)
Social media security : leveraging social networking while mitigating risk /
"Technology has become less about connecting computers, and more about connecting people. A major reason for this evolution is that the use of social media has exploded in the last few years, making it easier for individuals and businesses to contact others and get their messages across to larg...
Saved in:
Main Author: | Cross, Michael, 1965- |
---|---|
Format: | Book |
Language: | English |
Published: |
Amsterdam, [Netherlands] :
Syngress,
2013
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|