Skip recommendations
Suggested Topics within your search.
Suggested Topics within your search.
Skip recommendations
Biomedical materials
2
Fluid mechanics
2
Nanobiotechnology
2
Nanostructured materials
2
Anti-Infective Agents
1
Anti-infective agents
1
Biocompatible Materials
1
Biotechnology
1
Chemical processes
1
Computer networks
1
Computer security
1
Computer-aided design
1
Data processing
1
Data protection
1
Design and construction
1
Dressmaking
1
Earthquake engineering
1
Electrical engineering
1
Engineering
1
Engineering geology
1
Envronmental engineering
1
Equipment
1
Fluid models
1
Food
1
Garment cutting
1
Geophysics
1
Girders
1
Industrial engineering
1
Ionic solutions
1
Liquids
1
-
1Published 2016Table of Contents: “…Engineering of stimuli-sensitive nanopreparations to overcome physiological barriers and cancer multidrug resistance / N. …”
Book -
2
-
3by Matyokurehwa, Kanos, Rudhumbu, Norman, Gombiro, Cross, Chipfumbu-Kangara, ColletorSubjects: “…Social engineering framework…”
Published 2022
Get full text
Get full text
Article -
4
-
5Table of Contents: “…Front Cover; Social Engineering Penetration Testing; Copyright Page; Contents; Foreword; Acknowledgements; About the Authors; About the Technical Editor; 1 An Introduction to Social Engineering; Introduction; Defining social engineering; Examples from the movies; Sneakers; Hackers; Matchstick Men; Dirty Rotten Scoundrels; The Imposter; Famous social engineers; Kevin Mitnik; Frank Abagnale; Badir brothers; Chris Hadnagy; Chris Nickerson; Real-world attacks; The RSA breach; The Buckingham Palace breach; The Financial Times breach; The Microsoft XBox breach; Operation Camion; Summary. 2 The Weak Link in the Business Security ChainIntroduction; Why personnel are the weakest link; Secure data with vulnerable users; The problem with privileges; Data classifications and need to know; Security, availability, and functionality; Customer service mentality; Poor management example; Lack of awareness and training; Weak security policies; Weak procedures; Summary; 3 The Techniques of Manipulation; Introduction; Pretexting; Impersonation; Baiting; Pressure and solution; Leveraging authority; Reverse social engineering; Chain of authentication; Gaining credibility. …”
Book -
6Published 2016Subjects: “…Tissue engineering.…”
Book -
7
-
8
-
9
-
10by Madzikanda, Felex, Musiiwa, Talent, Giyane, Maxmillan, Mutembedza, Amanda, Mamboko, Patrick, Rebanowako, George T.Subjects: “…Security, Social Engineering, Psychology, Vulnerability…”
Published 2016
Get full text
Get full text
Article -
11by Simbarashe Shadreck Chitima“…Zimbabwe has a rich railway heritage that includes rail engines, wagons, coaches, trolleys, ticket rooms, rail stations, and tracks. …”
Published 2022
Get full text
Get full text
research article -
12by Mehlana, Gift“…Crystal engineering of metal organic frameworks (MOFs) has developed rapidly over the years. …”
Published 2017
Get full text
Get full text
-
13
-
14
-
15Subjects: “…Piling (Civil engineering)…”
Book -
16
-
17
-
18Book
-
19Subjects:Book
-
20“…Conference: BioInformatics and Bio Engineering Conference, At Granada, Spain…”
Get full text
Get full text