This resource is no longer available

Cover Image

This extract from Sharon Conheady’s book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how organisations can protect themselves from physical and cyber attacks.

This book is for security professionals who are interested in performing ethical social engineering tests and for anybody who is interested in how social engineering works. By understanding the steps that social engineers take, readers will be better able to defend against them.

Vendor:
TechTarget ComputerWeekly.com
Posted:
Feb 8, 2021
Published:
Sep 29, 2014
Format:
PDF
Type:
Book

This resource is no longer available.