In its most basic form, social engineering is the act of manipulating someone into doing something they normally would not do. For the authors' purposes, they will consider social engineering the art form of using deception and manipulation to persuade an unsuspecting person to perform actions like divulging confidential information ...Download Now
Penetration testing is much more than a necessary process to satisfy compliance obligations: it is a critical first step in the information and network security lifecycle and an important component of a full IT Security Compliance program. The purpose of a penetration test is to emulate real-world scenarios a hacker ...Download Now
Just about every person who runs and manages businesses will agree that, in order to compete in the marketplace, a company must assume a certain amount of risk. But they would also agree that the risks have to be calculated risks based on hard data, historical information and some sort ...Download Now
Submit Your Content
Get your content listed in our directory for free!
Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?