CW+ Premium Content/E-Handbooks

Thank you for joining!
Access your Pro+ Content below.
September 2014

Social Engineering in IT Security

Sponsored by

This extract from Sharon Conheady’s book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how organisations can protect themselves.

Table Of Contents


  • Why social engineering works
  • Executing the social engineering test
  • Tools of the trade

More CW+ Content

View All