Dissertação para a obtenção do Grau de Mestre em Segurança dos Sistemas de Informação
暂无分享,去创建一个
[1] InduShobha N. Chengalur-Smith,et al. An overview of social engineering malware: Trends, tactics, and implications , 2010 .
[2] Daniel Infante Ferreira Gonçalves. Pesquisas de marketing pela internet: as percepções sob a ótica dos entrevistados , 2008 .
[3] L. Cohen,et al. Research Methods in Education , 1980 .
[4] George Kurtz,et al. Hacking Exposed , 2005 .
[5] Isabel Loureiro,et al. Manual de educacao para a saúde em alimentacao , 1993 .
[6] R. Cialdini. Influence: Science and Practice , 1984 .
[7] Eric Maiwald,et al. Network Security: A Beginner's Guide , 2001 .
[8] Douglas P. Twitchell. Social engineering in information assurance curricula , 2006, InfoSecCD '06.
[9] Maria Cecília de Souza Minayo,et al. Pesquisa social: teoria, método e criatividade , 2015 .
[10] Thomas Peltier,et al. Social Engineering: Concepts and Solutions , 2006 .
[11] Lech J. Janczewski,et al. Social engineering-based attacks: Model and new zealand perspective , 2010, Proceedings of the International Multiconference on Computer Science and Information Technology.
[12] Andrea J. Cullen,et al. Social Engineering Detection Using Neural Networks , 2009, 2009 International Conference on CyberWorlds.
[13] Sarah Granger,et al. Social Engineering Fundamentals, Part I: Hacker Tactics , 2003 .
[14] D. Silverman. Qualitative research : theory, method and practice , 2004 .
[15] Tiantian Qi,et al. An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering , 2007 .
[16] William L. Simon,et al. The Art of Intrusion , 2005 .
[17] William L. Simon,et al. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers , 2005 .
[18] Roque Moraes,et al. Analise de conteudo , 1999 .
[19] Michael Workman,et al. A test of interventions for security threats from social engineering , 2008, Inf. Manag. Comput. Secur..
[20] Dong Hwi Lee,et al. Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique , 2007, ICCSA.
[21] Mohd Faizal Abdollah,et al. Generic Taxonomy of Social Engineering Attack , 2011 .
[22] A. C. Gil. Métodos e técnicas de pesquisa social , 2008 .
[23] Miriam H. Baer. Corporate Policing and Corporate Governance: What Can We Learn from Hewlett-Packard's Pretexting Scandal? , 2008 .
[24] William L. Simon,et al. The Art of Deception: Controlling the Human Element of Security , 2001 .