Cargando…
Social engineering in IT security: tools, tactics, and techniques
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
McGraw-Hill Education
2014
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2658745 |
_version_ | 1780961340276342784 |
---|---|
author | Conheady, Sharon |
author_facet | Conheady, Sharon |
author_sort | Conheady, Sharon |
collection | CERN |
id | cern-2658745 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2014 |
publisher | McGraw-Hill Education |
record_format | invenio |
spelling | cern-26587452021-04-21T18:35:22Zhttp://cds.cern.ch/record/2658745engConheady, SharonSocial engineering in IT security: tools, tactics, and techniquesComputing and ComputersMcGraw-Hill Educationoai:cds.cern.ch:26587452014 |
spellingShingle | Computing and Computers Conheady, Sharon Social engineering in IT security: tools, tactics, and techniques |
title | Social engineering in IT security: tools, tactics, and techniques |
title_full | Social engineering in IT security: tools, tactics, and techniques |
title_fullStr | Social engineering in IT security: tools, tactics, and techniques |
title_full_unstemmed | Social engineering in IT security: tools, tactics, and techniques |
title_short | Social engineering in IT security: tools, tactics, and techniques |
title_sort | social engineering in it security: tools, tactics, and techniques |
topic | Computing and Computers |
url | http://cds.cern.ch/record/2658745 |
work_keys_str_mv | AT conheadysharon socialengineeringinitsecuritytoolstacticsandtechniques |