Hampering the Human Hacker and the Threat of Social Engineering Hampering the Human Hacker and the Threat of Social Engineering

Hampering the Human Hacker and the Threat of Social Engineering

    • 3.7 • 16 Ratings

Publisher Description

With an increase an security breaches which result in compromised customer records, companies of all sizes need to understand the deceptive practices that social engineers use and how to protect themselves and their customers from attacks. Learn what social engineering is, how it is used to gain access to corporate information and customer data.

GENRE
Business & Personal Finance
RELEASED
2012
August 13
LANGUAGE
EN
English
LENGTH
9
Pages
PUBLISHER
Voxeo Corportation
SELLER
Draft2Digital, LLC
SIZE
42.8
KB

Customer Reviews

CresentChaos ,

Quick Guide

For me this was a quick guide and it gives you some tips on how to protect yourself against Human Hackers.

DarkViris ,

Bit old, But Great.

The book is a little old, but the info is still great. It details little things that work to stop social engineers from stealing your life away.

Mellowkill ,

Simple yet powerful

Knowledge is key to success as Voxeo is key to protection. Elementary and social in scope this is basic safety and immensely valuable. Great information.

More Books Like This

Enterprise Social Technology Enterprise Social Technology
2011
The Grey Line: Modern Corporate Espionage and Counter Intelligence The Grey Line: Modern Corporate Espionage and Counter Intelligence
2011
The Social Media Management Handbook The Social Media Management Handbook
2010
Social Marketing to the Business Customer Social Marketing to the Business Customer
2010
2013 Collaboration Guide 2013 Collaboration Guide
2013
Get Bold Get Bold
2011

Customers Also Bought

Gunner: The Hacker's Code Gunner: The Hacker's Code
2015
The BillyGate Affair: How Hackers at Microsoft and Google Revealed Their Massive Malware Operation The BillyGate Affair: How Hackers at Microsoft and Google Revealed Their Massive Malware Operation
2014
The Eagle Claw Hack The Eagle Claw Hack
2014
Hacker With a Capital C Hacker With a Capital C
2015
L'ideologia di Internet: Dalla A di App alla Z di Zipcar L'ideologia di Internet: Dalla A di App alla Z di Zipcar
2019
Hack the System with Acts of Creative Rebellion Hack the System with Acts of Creative Rebellion
2010