Results 231 to 240 of about 2,195,820 (278)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2023
This entry reviews the concept of social engineering, the use of deception to circumvent information security measures. While the term social engineering traces its roots back to attempts in the late 19th and early 20th centuries to manipulate social groups, the contemporary use of the term is rooted in the mid-20th century and its use among telephone ...
Kevin F. Steinmetz, Cassandra Cross
openaire +3 more sources
This entry reviews the concept of social engineering, the use of deception to circumvent information security measures. While the term social engineering traces its roots back to attempts in the late 19th and early 20th centuries to manipulate social groups, the contemporary use of the term is rooted in the mid-20th century and its use among telephone ...
Kevin F. Steinmetz, Cassandra Cross
openaire +3 more sources
Proceedings of the International Conference and Workshop on Emerging Trends in Technology, 2010
Docupedia ...
Etzemüller, Thomas +1 more
+4 more sources
Docupedia ...
Etzemüller, Thomas +1 more
+4 more sources
Proceedings of the 14th annual ACM SIGCSE conference on Innovation and technology in computer science education, 2009
We describe two experiments to get security-relevant data using Social Engineering. The success of the experiments is disturbing.
Guido Rößling, Marius Müller
openaire +2 more sources
We describe two experiments to get security-relevant data using Social Engineering. The success of the experiments is disturbing.
Guido Rößling, Marius Müller
openaire +2 more sources

