44,95 €
44,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
22 °P sammeln
44,95 €
44,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
22 °P sammeln
Als Download kaufen
44,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
22 °P sammeln
Jetzt verschenken
44,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
22 °P sammeln
  • Format: PDF

This book explains how social engineering methods are being commonly used and how organizations and individuals can socially engineer their culture to help minimize the impact of the activities of those who lie, cheat, deceive, and defraud whether they do so from a former Soviet state or from Washington, D.C.

Produktbeschreibung
This book explains how social engineering methods are being commonly used and how organizations and individuals can socially engineer their culture to help minimize the impact of the activities of those who lie, cheat, deceive, and defraud whether they do so from a former Soviet state or from Washington, D.C.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Michael Erbschloe worked for over 30 years performing analysis of the economics of information technology, public policy relating to technology, and utilizing technology in reengineering organization processes. He has authored several books on social and management issues of information technology most of which covered some aspects of information or corporate security. Mr. Erbschloe has also taught at several universities and developed technology-related curriculum. His career has focused on several interrelated areas: technology strategy, analysis, and forecasting; teaching and curriculum development; writing books and articles; speaking at conferences and industry events; publishing and editing; and public policy analysis and program evaluation. He currently works as a consultant on technology and security issues.