A Structured Comparison of Social Engineering Intelligence Gathering Tools
暂无分享,去创建一个
Kristian Beckers | Sebastian Pape | Daniel Schosser | Peter Schaab | Kristian Beckers | Sebastian Pape | Daniel Schosser | Peter Schaab
[1] Michael Erbschloe. Introduction to Social Engineering Use by Bad Guys , 2019 .
[2] Edgar R. Weippl,et al. Social engineering attacks on the knowledge worker , 2013, SIN.
[3] Christopher Hadnagy,et al. Social Engineering: The Art of Human Hacking , 2010 .
[4] Pieter H. Hartel,et al. Two methodologies for physical penetration testing using social engineering , 2009, ACSAC '10.
[5] Merrill Warkentin,et al. Behavioral and policy issues in information systems security: the insider threat , 2009, Eur. J. Inf. Syst..
[6] Larry Gragg. Chapter Two. First Impressions , 2003 .
[7] Neil Barrett,et al. Penetration testing and social engineering: Hacking the weakest link , 2003, Inf. Secur. Tech. Rep..
[8] Radha Gulati. The Threat of Social Engineering and Your Defense Against It , 2003 .
[9] D. Gragg. A Multi-Level Defense Against Social Engineering , 2003 .
[10] William L. Simon,et al. The Art of Deception: Controlling the Human Element of Security , 2001 .
[11] Max S. Baucus,et al. National Association of Counties , 1997 .