Social software engineering

Results: 749



#Item
161Software / Computing / Phishing / Spamming / Computer network security / Password / Two-factor authentication / Anti-phishing software / Transaction authentication number / Social engineering / Microsoft Windows / Computer crimes

Microsoft Word - revision.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-06-13 15:24:13
162Electronic engineering / Containers / Rolodex / Telephony / Address book / Paperless office / NTL Incorporated / Calendaring software / Ringtone / Office equipment / Technology / Business

SOCIAL MEDIA How much has communication changed in the legal profession in the past 20 years? Tickler systems were first implemented in the early

Add to Reading List

Source URL: www.practicepro.ca

Language: English - Date: 2015-02-13 12:19:56
163Spamming / Key management / Public-key cryptography / Electronic commerce / Phishing / Social engineering / Public key certificate / Extended Validation Certificate / X.509 / Cryptography / Software / Computing

Beyond the Lock Icon: Real-time Detection of Phishing Websites Using Public Key Certificates Zheng Dong∗ , Apu Kapadia∗ , Jim Blythe† and L. Jean Camp∗ ∗ School

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2015-03-04 19:58:08
164Standards organizations / Social philosophy / Institute of Electrical and Electronics Engineers / Business ethics / Integrity / Software engineer / Confidentiality / Software engineering professionalism / Accounting ethics / Ethics / Professional ethics / Software engineering

Microsoft Wordrevised

Add to Reading List

Source URL: rs.ieee.org

Language: English - Date: 2011-06-08 19:35:20
165Phishing / Crime / Computer network security / Ethics / Criminology / Anti-phishing software / In-session phishing / Social engineering / Computer crimes / Spamming

TRUST AND SEMANTIC ATTACKS - II Class Notes: February 23, 2006

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-02-28 20:18:35
166Social engineering / Spamming / Computer crimes / Computer network security / Trusteer / Pharming / Zeus / Man-in-the-browser / Phishing / Computing / Malware / Cybercrime

IBM Software Thought Leadership White Paper Financial malware explained Explore the lifecycle of fraudulent transactions and how to take action against emerging threats

Add to Reading List

Source URL: www.americanbanker.com

Language: English - Date: 2015-04-07 14:28:13
167Internet / Social engineering / Email / Phishing / PayPal / Email spam / Address bar / Firefox / Website / Software / Spamming / Computing

An Analysis of a Phishing Expedition By Rick Hellewell www.digitalchoke.com/daynotes December 20, 2004 If you have an email address, you will get a phish email. This is a term for an email message that directs you

Add to Reading List

Source URL: www.jerrypournelle.com

Language: English - Date: 2011-06-04 10:22:09
168News aggregators / Human–computer interaction / Social engineering / HTTP / Framing / Cross-site scripting / Frame / Firefox / HTTP Secure / Software / Computing / FTP clients

Securing Frame Communication in Browsers Adam Barth Stanford University Collin Jackson

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-03-09 17:36:54
169Phishing / Internet / Netcraft / Computer network security / Anti-Phishing Working Group / Password / Crime / Computing / Anti-phishing software / Spamming / Social engineering / Computer crimes

Usable Privacy and Security Trust and semantic attacks II Lecture and notes written by Ponnurangam K Lecture notes, Discussion and Activity February 23, 2006

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-02-28 21:37:15
170Classical cipher / Index of agriculture articles / Computer programming / Computing / Software engineering

How far can Q-analysis go into social systems understanding ? s

Add to Reading List

Source URL: www.afscet.asso.fr

Language: English - Date: 2010-06-08 15:20:40
UPDATE