Skip recommendations
Suggested Topics within your search.
Suggested Topics within your search.
Skip recommendations
Social aspects
4
Security measures
3
Computer crimes
2
Computer security
2
Emigration and immigration
2
Human rights
2
Law and legislation
2
Methodology
2
Research
2
Social conditions
2
Social service
2
Social workers
2
African fiction
1
Alienation (social psychology)
1
Biomedical Research
1
Border crossing
1
Business records
1
Communication studies
1
Compulsive gambling
1
Computer networks
1
Copyright
1
Data protection
1
Deportation
1
Distribution (Economic theory)
1
Electronic commerce
1
Electronic data interchange
1
Experiments
1
Fieldwork
1
Government policy
1
History
1
-
1
-
2by Cross, Michael, 1965-Table of Contents: “…Machine generated contents note: Introduction Defining Social Networking Why Social Media Is Important Defining the Organization's Goals for Social Networking Use Risks Present in Social Networking Mitigating Risks Continuous Social Networking Security Summary.…”
Published 2013
Book -
3by Brammer, AlisonTable of Contents: “…Introduction to law and social work practice -- Sources of law -- Courts and law officers -- Social workers' role in law -- The Human Rights act 1998 and social work practice -- Discrimination -- Supporting children and families -- Children and family breakdown -- Child protection -- Looked after children -- Adoption -- Education -- Youth justice -- Adult social care -- Mental health -- Mental capacity -- Adult safeguarding -- Criminal justice -- Welfare and homelessness -- Asylum.…”
Published 2015
Book -
4by Moyo, Vanessa Y.Subjects: “…‘socialness’ of online social media…”
Published 2020
Get full text
Thesis -
5
-
6by Matyokurehwa, Kanos, Rudhumbu, Norman, Gombiro, Cross, Chipfumbu-Kangara, ColletorSubjects: “…Social engineering framework…”
Published 2022
Get full text
Get full text
Article -
7Table of Contents: “…Front Cover; Social Engineering Penetration Testing; Copyright Page; Contents; Foreword; Acknowledgements; About the Authors; About the Technical Editor; 1 An Introduction to Social Engineering; Introduction; Defining social engineering; Examples from the movies; Sneakers; Hackers; Matchstick Men; Dirty Rotten Scoundrels; The Imposter; Famous social engineers; Kevin Mitnik; Frank Abagnale; Badir brothers; Chris Hadnagy; Chris Nickerson; Real-world attacks; The RSA breach; The Buckingham Palace breach; The Financial Times breach; The Microsoft XBox breach; Operation Camion; Summary. 2 The Weak Link in the Business Security ChainIntroduction; Why personnel are the weakest link; Secure data with vulnerable users; The problem with privileges; Data classifications and need to know; Security, availability, and functionality; Customer service mentality; Poor management example; Lack of awareness and training; Weak security policies; Weak procedures; Summary; 3 The Techniques of Manipulation; Introduction; Pretexting; Impersonation; Baiting; Pressure and solution; Leveraging authority; Reverse social engineering; Chain of authentication; Gaining credibility. …”
Book -
8
-
9by Nhuta, StephenSubjects: “…Social Entrepreneurship, Innovation, Economic Development, Social Imbalance, Value creation…”
Published 2016
Get full text
Get full text
Article -
10by Tererai, Simukai Betserai FreedomSubjects: “…Social security scheme…”
Published 2019
Get full text
Other -
11by Chigangaidze, Robert K.Subjects: “…Developmental-clinical social work,…”
Published 2022
Get full text
Get full text
Article -
12
-
13
-
14
-
15by Chikwanha, HappinessSubjects: “…social semiotic engagement…”
Published 2020
Get full text
Thesis -
16
-
17by Vhutuza, EphraimSubjects: “…Perspectives on drama, social change in Zimbabwe…”
Published 2016
Get full text
Book chapter -
18by Muzvidziwa, Victor N.Subjects: “…International economic relations--Social aspects.…”
Published 2016
Get full text
text -
19
-
20Published 1992Table of Contents: “…Implementing structural adjustment programmes in Africa : some implications for social work practice and training /…”
Conference Proceeding Book