Similar Items
-
Social media security : leveraging social networking while mitigating risk /
by: Cross, Michael, 1965-
Published: (2013) -
Theoretical and experimental methods for defending against DDoS attacks /
by: Reza Khalifeh Soltanian, Mohammad, et al.
Published: (2016) -
Windows registry forensics : advanced digital forensic analysis of the Windows registry /
by: Carvey, Harlan A.
Published: (2016) -
Investigating the awareness of social engineering on current and future employees
by: Madzikanda, Felex, et al.
Published: (2016) -
Enhanced social engineering framework mitigating against social engineering attacks in higher education
by: Matyokurehwa, Kanos, et al.
Published: (2022)
Social engineering penetration testing : executing social engineering pen tests, assessments and defense /
This book gives the practical methodology needed to plan and execute a social engineering penetration test and assessment. It has insights into how social engineering techniques--including email phishing, telephone pretexting, and physical vectors--can be used to elicit information or manipulate ind...
Saved in:
Main Authors: | Watson, Gavin (Author), Mason, Andrew (Author), Ackyord, Richard (Author) |
---|---|
Format: | Book |
Language: | English |
Published: |
Oxford:
Elsevier,
2014
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|