Access your Pro+ Content below.
Social Engineering in IT Security
Sponsored by ComputerWeekly.com
This extract from Sharon Conheady’s book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how organisations can protect themselves.
Table Of Contents
- Why social engineering works
- Executing the social engineering test
- Tools of the trade