Search

Your search keyword '"*SOCIAL engineering (Fraud)"' showing total 1,333 results

Search Constraints

Start Over You searched for: Descriptor "*SOCIAL engineering (Fraud)" Remove constraint Descriptor: "*SOCIAL engineering (Fraud)"
1,333 results on '"*SOCIAL engineering (Fraud)"'

Search Results

51. Handling Your Digital Assets.

52. BEWARE: Growing Cyberthreats.

53. TOWARD A MORE FANTASTIC PLASTIC.

54. HACKING HUMANS.

55. Leveraging history to invoke nationalism: from the annals of history to social engineering of present and future in Hindi cinema.

56. Engineering concepts by engineering social norms: solving the implementation challenge.

58. Phishing Attacks Detection Using Ensemble Machine Learning Algorithms.

59. Exploiting vulnerabilities.

60. A BIZTONSÁG MEGJELENÉSE A HUMÁN TUDOMÁNYOKBAN (2. RÉSZ).

61. Fintech Fraud Detection and Prevention.

62. Aspek Pelindungan Hukum Atas Data Pribadi Nasabah pada Penyelenggaraan Layanan Mobile Banking pada PT. Bank Rakyat Indonesia Cabang Stabat.

63. From Humble Beginnings: How the CISO Role Has Evolved.

64. WHO INVENTED THE SO-CALLED "MOLDAVIAN LANGUAGE"? THE OBJECTIVES AND THE PERPETRATORS BEHIND THE INVENTION AND WEAPONIZATION OF THE SO-CALLED "MOLDAVIAN" AND "VLACH" LANGUAGES.

65. Book Review: A Social Philosophy of Science: An Introduction.

66. Using machine learning algorithms to predict individuals' tendency to be victim of social engineering attacks.

68. A robust approach to authorship verification using siamese deep learning: application in phishing email detection.

69. DEVELOPMENT OF A MODEL OF THE INFORMATION AND ANALYTICAL SYSTEM FOR MAKING DECISIONS ON DETECTING FAILURES OF INFORMATION TRANSMISSION CHANNELS.

71. Cybercrime Intention Recognition: A Systematic Literature Review.

72. An Extension of Small Business Cybersecurity Into the Classroom and Community.

73. User Susceptibility to Malicious Push Notifications in Augmented Reality at the Workplace.

74. Protect your business from AI-powered security threats.

75. Social engineering design based on community groups around the site on the plan for the development of a nuclear power plant in West Kalimantan.

76. RWANDA.

77. BFSI and Security: Will The Wine Glass Stay?

78. Conquering the Security Trifecta: Top CISO Concerns and some actionable recommendations.

79. Opening to the Joy of Work.

80. HOW DO YOU KNOW IF YOU'VE BEEN.

81. 4 Types of Gen AI Risk and How to Mitigate Them.

82. Adopt the Best Practices for Software Development.

83. HOW DO YOU KNOW IF YOU'VE BEEN HACKED?

84. HOW DO YOU KNOW IF YOU’VE BEEN HACKED?

85. Revolutionizing banking security.

86. Get ready for the biggest security threats of 2025.

87. The Weaponization of Artificial Intelligence in Cybersecurity: A Systematic Review.

88. Rural social engineering: reordering the countryside in decolonising India and Malaysia (1947–60).

89. The Ancient City of Giddan/Eddana (Anqa, Iraq), the "Forgotten Twin" of Dura-Europos.

90. A Cybersecurity Awareness Model for the Protection of Saudi Students from Social Media Attacks.

92. Imperial algorithms: Contemporary manifestations of racism and colonialism.

93. Defense for Advanced Persistent Threat with Inadvertent and Malicious Insider Threats.

94. DEVELOPMENT OF THE SOCIOCYBERPHYSICAL SYSTEMS` MULTI-CONTOUR SECURITY METHODOLOGY.

95. Introduction: On repertoire.

97. An Ensemble Classification Model for Phishing Mail Detection.

98. The counterinsurgent imagination: a new intellectual history: by Joseph MacKay, New Delhi, Cambridge University Press, 2023, 310 pp., ₹2714 (paperback), ISBN: 978-1-009-22582-3.

99. Wannacry ransomware attack: The enemy lies under your blanket.

100. Web-based biometric authentication system for web applications (WBAS).

Catalog

Books, media, physical & digital resources