References

  1. Verizon, 2017 Data Breach Investigation Report, 10th Edition, 27 April, 2017, Retrieved 05.02.2018, http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/
  2. Kaspersky, Social Engineering - Definition, Retrieved 10.02.2018, https://usa.kaspersky.com/resource-center/definitions/social-engineering
  3. CEHTM v9 Certified Ethical Hacker Version 9 Study Guide, John Wiley & Sons, 2016
  4. M. Bezuidenhout, F. Mouton, and H. S. Venter, "Social engineering attack detection model: Seadm," in Information Security for South Africa (ISSA), 2010. IEEE, 2010, pp. 1-8.
  5. K. D. Mitnick and W. L. Simon, The art of deception: Controlling the human element of security. John Wiley & Sons, 2011.
  6. M. I. Mann, Hacking the human: social engineering techniques ...

Get Learn Social Engineering now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.