Bringing security home: a process for developing secure and usable systems
Proceedings of the 2003 workshop on New security paradigms
Social engineering: the "Dark Art"
Proceedings of the 1st annual conference on Information security curriculum development
Omnivore: risk management through bidirectional transparency
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Hacking human: data-archaeology and surveillance in social networks
ACM SIGGROUP Bulletin - Special issue on virtual communities
Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Web engineering security: a practitioner's perspective
ICWE '06 Proceedings of the 6th international conference on Web engineering
Masking page reference patterns in encryption databases on untrusted storage
Data & Knowledge Engineering - Special issue: ER 2004
Fourth-factor authentication: somebody you know
Proceedings of the 13th ACM conference on Computer and communications security
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
An information-centric and proactive approach to Information Security teaching
International Journal of Information and Computer Security
Using Cartoons to Teach Internet Security
Cryptologia
Social Engineering Techniques, Risks, and Controls
The EDP Audit, Control, and Security Newsletter
On the Anatomy of Human Hacking
Information Systems Security
Gaining Access with Social Engineering: An Empirical Study of the Threat
Information Systems Security
A Supraliminal Channel in a Videoconferencing Application
Information Hiding
Privacy analysis and enhancements for data sharing in *nix systems
International Journal of Information and Computer Security
Social Engineering: Hacking the Wetware!
Information Security Journal: A Global Perspective
On the importance of securing telephony systems
WSEAS TRANSACTIONS on COMMUNICATIONS
Modern telephony threats & countermeasures
ICCOM'08 Proceedings of the 12th WSEAS international conference on Communications
Uncertainty in the weakest-link security game
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Mal-activity diagrams for capturing attacks on business processes
REFSQ'07 Proceedings of the 13th international working conference on Requirements engineering: foundation for software quality
Dependability metrics
Examining the Role of Technology in the Formation of Deviant Subcultures
Social Science Computer Review
Understanding scam victims: seven principles for systems security
Communications of the ACM
Ontological semantic technology for detecting insider threat and social engineering
Proceedings of the 2010 workshop on New security paradigms
Online addiction: privacy risks in online gaming environments
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Active learning approaches to teaching information assurance
2010 Information Security Curriculum Development Conference
Training students to steal: a practical assignment in computer security education
Proceedings of the 42nd ACM technical symposium on Computer science education
Reverse social engineering attacks in online social networks
DIMVA'11 Proceedings of the 8th international conference on Detection of intrusions and malware, and vulnerability assessment
Phishing: The big picture on big holes
Network Security
Graphical passwords: Learning from the first twelve years
ACM Computing Surveys (CSUR)
Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks
International Journal of Secure Software Engineering
Social Engineering: The Neglected Human Factor for Information Security Management
Information Resources Management Journal
Social engineering attacks on the knowledge worker
Proceedings of the 6th International Conference on Security of Information and Networks
An Interdisciplinary Approach to Educating an Effective Cyber Security Workforce
Proceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development Conference
PhishSafe: leveraging modern JavaScript API's for transparent and robust protection
Proceedings of the 4th ACM conference on Data and application security and privacy
Software and Systems Modeling (SoSyM)
Hi-index | 0.02 |
From the Publisher:A Legendary Hacker Reveals How To Guard Against the Gravest Security Risk of AllHuman NatureAuthor Biography: Kevin D. Mitnick is a security consultant to corporations worldwide and a cofounder of Defensive Thinking, a Los Angeles-based consulting firm (defensivethinking.com). He has testified before the Senate Committee on Governmental Affairs on the need for legislation to ensure the security of the government's information systems. His articles have appeared in major news magazines and trade journals, and he has appeared on Court TV, Good Morning America, 60 Minutes, CNN's Burden of Proof and Headline News, and has been a keynote speaker at numerous industry events. He has also hosted a weekly radio show on KFI AM 640, Los Angeles. William L. Simon is a bestselling author of more than a dozen books and an award-winning film and television writer.