Chapter 1
Footnotes
http://threatpost.com/breach-compression-attack-steals-https-secrets-in-under-30-seconds/101579
.:
http://threatpost.com/the-year-in-nsa/103329
.
http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=norton-report-2013
http://www.iso.org/iso/home/standards/management-standards.htm
References
http://info.cern.ch/hypertext/WWW/TheProject.html
Chapter 2
Footnotes
http://resources.sei.cmu.edu/library/asset-view.cfm?assetid=88289
http://users.telenet.be/d.rijmenants/en/enigma.htm
http://www.geograph.org.uk/photo/2597296
http://spectrum.ieee.org/telecom/standards/phreaking-out-ma-bell
https://archive.org/details/bstj39-6-1381
http://www.beatriceco.com/bti/porticus/bell/about.html
http://www.reuters.com/article/2013/08/21/us-usa-wikileaks-manning-idUSBRE97J0JI20130821
https://wikileaks.org/Statement-by-Julian-Assange-on,267.html
http://www.biography.com/people/edward-snowden-21262897#synopsis
http://www.democracynow.org/2010/12/3/is_wikileaks_julian_assange_a_hero
Additional References
-
LUDLOW, PETER. (2010). WikiLeaks and Hacktivist Culture. The Nation, October 4th, 2010.
-
BURGHARDT, TOM. (2013). ECHELON Today: The Evolution of an NSA Black Program. Global Research.
-
A&E TELEVISION NETWORKS, LLC. Edward Snowden, Biography. [Online] Available from: http://www.biography.com/people/edward-snowden-21262897
-
KARHULA, PAIVIKKI. (2011). What is the Effect of WikiLeaks for Freedom of Information? [Online] Available from:
http://www.ifla.org/publications/what-is-the-effect-of-wikileaks-for-freedom-of-information
-
NAKASHIMA, ELLEN. MARKON, JERRY, & WASHINGTON POST STAFF WRITERS. (2010). WikiLeaks Founder Could be Charged Under Espionage Act. Washington Post: November 30 th , 2010. [Online] Available from: http://www.washingtonpost.com/wp-dyn/content/article/2010/11/29/AR2010112905973.html
-
TAYLOR, MARISA. (2014). U.S. Spy Agency’s Push for Secrecy Seen as Another Failing of Obama’s Transparency Pledge. McClatchy Washington Bureau. [Online] Available from:
http://www.kansas.com/2014/01/15/3228179/us-spy-agencys-push-for-secrecy.html
-
ROSENBAUM, RON. Secrets of the Little Blue Box. [Online] Available from:
http://www.webcrunchers.com/crunch/esq-art.html
-
WESOLKOWSKI, SLAWO. (2009). The Invention of Enigma and How the Polish Broke It Before the Start of WWII.University of Waterloo.
-
GOODELL, JEFF. (1996). The Cyberthief and the Samurai: The True Story of Kevin Mitnick and the Man Who Hunted Him Down.
Chapter 3
Footnotes
http://www.techrepublic.com/blog/it-security/understanding-layered-security-and-defense-in-depth/
www.iso.org/
http://csrc.nist.gov/publications/nistpubs/
.
http://www.sabsa.org/white_paper
http://csrc.nist.gov/publications/nistpubs/800-100/SP800-100-Mar07-2007.pdf
http://standards.iso.org/ittf/PubliclyAvailableStandards/c063411_ISO_ IEC_27000_2014.zip
http://www.bluetoad.com/publication/?i=41813&page=1
http://resources.sei.cmu.edu/library/asset-view.cfm?assetid=6795
http://searchsecurity.techtarget.com/news/1527643/ISC2-survey-reveals-need-for-secure-application-development-skills
http://csrc.nist.gov/publications/nistpubs/800-14/800-14.pdf
Chapter 4
Footnotes
:
http://csrc.nist.gov/publications/PubsSPs.html
Chapter 5
Footnotes
http://csrc.nist.gov/publications/PubsFIPS.html
.
http://csrc.nist.gov/publications/PubsSPs.html
.
http://csrc.nist.gov/publications/PubsSPs.html
.
http://csrc.nist.gov/publications/PubsSPs.html
.
Chapter 6
Footnotes
www.scholar.google.com
http://www.smh.com.au/travel/travel- incidents/air-india-dreamliner-flight-from-melbourne-makes-emergency- landing-due-to-glitches-20140206-322wh.html
http://www.hindustantimes.com/india-news/ai-flight-makes-emergency-landing- in-kuala-lumpur/article1-1180854.aspx
https://www.golemtechnologies.com/articles/shell-injection
Additional References
-
BOYD, STEPHEN W. & ANGELOS D. KEROMYTIS. (2004). SQLrand: Preventing SQL injection attacks. Applied Cryptography and Network Security. Springer Berlin Heidelberg.
-
YODER, JOSEPH & JEFFREY BARCALOW. (1998). Architectural patterns for enabling application security. Urbana 51 (1998): 61801.
-
YIP, ALEXANDER, ET AL. (2009). Improving application security with data flow assertions. Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles. ACM, 2009.
-
MCGRAW, GARY. (2004). Software security. Security & Privacy, IEEE 2.2 (2004): 80–83.
Chapter 7
Footnotes
http://wallstcheatsheet.com/technology/hacked-apples-helpful-security-service-turned-harmful.html/
https://www.usenix.org/legacy/event/sruti05/tech/full_papers/cooke/cooke_html/
http://www.eweek.com/blogs/security-watch/internet-of-things-could-bring-on-attack-of-the-killer-toaster-botnet.html
(Posted 2013-10-10)
http://www.eweek.com/c/a/Web-Services-Web-20-and-SOA/Trail-of-Destruction-The-History-of-the-Virus/
(Posted 2002-03-22) & SEAN MICHAEL KERNER. (2013). eWEEK 30: Computer Viruses Evolve from Minor Nuisances to Costly Pests. [Online] Available at:
http://www.eweek.com/security/eweek-30-computer-viruses-evolve-from-minor-nuisances-to-costly-pests.html
(
Posted 2013-11-15)http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=istr-18
http://www.mcafee.com/in/security-awareness/articles/mcafee-labs-threats-report-q4-2013.aspx
http://www.mcafee.com/in/security-awareness/articles/the-top-internet-security-threats-for-2014.aspx
http://in.norton.com/360/
(accessed on 30th March 2014)http://home.mcafee.com/store/total-protection
(Accessed on 30th March 2014)http://www.kaspersky.co.in/kaspersky-pure
http://anti-virus-software-review.toptenreviews.com/
http://www.bitdefender.com/media/html/launch2014/?pid=in_nocover&sem_region=IN&utm_source=Google&utm_campaign=IN_Bitdefender&sem_type=search&sem_placement=&utm_content=38150774619&utm_term=bitdefender%20antivirus&gclid=CJnei73TvL0CFeIb4god6VoAYw
& HERMAN STREET. (2014). [Online] Available from: http://store.hermanstreet.com/index.php?p=np&page_id=bitdefender-antivirus&ICID=bitdefender-2013-10-16&ofm
http://www.avg.com/in-en/internet-security
& HARMAN STREET. (2014). [Online] Available from: http://store.hermanstreet.com/pc-software/avg-anti-virus-2014-download/?&ICID=pin-AVG%20AntiVirus%202013-9-17bas&ofm
(both accessed on 30th March 2014)Chapter 8
Footnotes
:
http://www.rfc-editor.org/info/rfc2440
http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
http://www.rfc-editor.org/rfc/rfc2144.txt
http://www.rfc-editor.org/rfc/rfc2612.txt
http://www.rfc-editor.org/rfc/rfc2268.txt
http://www.rfc-editor.org/rfc/rfc2040.txt
https://www.schneier.com/blowfish.html
http://www.rfc-editor.org/rfc/rfc3713.txt
http://www.rfc-editor.org/rfc/rfc2994.txt
http://www.rfc-editor.org/rfc/rfc4269.txt
http://www.rfc-editor.org/rfc/rfc5794.txt
http://www.rfc-editor.org/rfc/rfc6114.txt
http://www.rfc-editor.org/rfc/rfc7008.txt
http://www.sans.org/reading-room/whitepapers/telephone/gsm-standard-an-overview-security-317
http://www.etsi.org/services/security-algorithms/cellular-algorithms
http://www.rfc-editor.org/rfc/rfc3447.txt
http://csrc.nist.gov/groups/STM/cavp/documents/dss/rsanewval.html
http://www.rfc-editor.org/rfc/rfc6090.txt
http://www.rfc-editor.org/rfc/rfc1319.txt
http://www.rfc-editor.org/rfc/rfc4634.txt
http://csrc.nist.gov/groups/ST/hash/sha-3/index.html
http://www.timberlinetechnologies.com/products/pki.html
https://www.itu.int/rec/T-REC-X.509/en
http://csrc.nist.gov/keyrecovery/cap.txt
http://epic.org/crypto/clipper/
http://csrc.nist.gov/publications/PubsFIPS.html
http://csrc.nist.gov/publications/PubsFIPS.html
http://truecrypt.sourceforge.net/
Additional References
-
DIFFIE, WHITFIELD, & MARTIN E. HELLMAN. (1976). New directions in cryptography. Information Theory, IEEE Transactions on 22.6 (1976): 644-654.
-
ODED, GOLDREICH. (2001). Foundations of Cryptography, Volume 1: Basic Tools. Cambridge University Press.
-
MERRIAM-WEBSTER. Cryptology (definition). Merriam-Webster's Collegiate Dictionary. 11th edition. [Online] Available from:
http://www.merriam-webster.com/dictionary/cryptology
. Retrieved 2008-02-01. -
SCHNEIER, BRUCE. (1996). Applied Cryptography. Second Edition. J. Wiley and Sons.
-
STALLINGS, WILLIAM. (2003). Cryptography and Network Security, Principles and Practice. Third edition. Prentice Hall.
-
JOHNSON, J. & B. KALISKI. (2003). RFC 3447 - Public-Key Cryptography Standards (PKCS): RSA Cryptography Specifications Version 2.1. [Online] Available from:
https://www.ietf.org/rfc/rfc3447.txt
-
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY. (2001). Federal Information Processing Standards (FIPS) 140-2 - Security Requirements for Cryptographic Modules. [Online] Available from:
http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf
-
INTERNET ENGINEERING TASK FORCE. (2008). An Open Specification for Pretty Good Privacy (openpgp). [Online] Available from:
http://datatracker.ietf.org/wg/openpgp/charter/
-
SCHNEIER, B. (1996). Applied Cryptography. 2nd edition. New York: John Wiley & Sons.
-
SCHNEIER, B. (2000). Secrets & Lies: Digital Security in a Networked World. New York: John Wiley & Sons.
-
STALLINGS, W. (2014). Cryptography and Network Security: Principles and Practice. 6th edition. Dorling Kindersley (India) Pvt. Ltd.
Chapter 9
Footnotes
http://www.iso.org/iso/home/about.htm
http://www.itu.int/rec/T-REC-X.200-199407-I/en
http://www.ietf.org/rfc/rfc1122.txt
:
http://www.ietf.org/rfc/rfc791.txt
http://www.ietf.org/rfc/rfc793.txt
http://technet.microsoft.com/en-us/library/cc958821.aspx
:
http://www.zdnet.com/uk/hsbc-banking-websites-recover-from-dos-attack-7000006063/
.
http://www.pcmag.com/article2/0,2817,1485719,00.asp
http://www.ietf.org/rfc/rfc4987.txt
Additional References
-
STEVENS, W.R. (1994). TCP/IP Illustrated, Volume I: The Protocols. Addison-Wesley.
-
MILLER, M. (1999). Troubleshooting TCP/IP. John Wiley & Sons.
-
CAPPELL, L.A. & E. TITTEL. (2004). Guide to TCP/IP. Second Edition. Thomson Course Technology.
-
FEIT, S. (2000). TCP/IP: Architecture, Protocols, and Implementation with IPv6 and IP Security. McGraw-Hill.
-
COMER, D. (1991). Internetworking with TCP/IP, Vol. I: Principles, Protocols, and Architecture. Second Edition. Prentice-Hall.
Chapter 10
Footnotes
http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Campus/HA_campus_DG/hacampusdg.html
http://www.ietf.org/rfc/rfc791.txt
http://www.ietf.org/rfc/rfc793.txt
http://www.ietf.org/rfc/rfc1631.txt
http://www.ietf.org/rfc/rfc1918.txt
Additional References
-
CISCO SYSTEMS. Cisco Firewall best Practices. [Online] Available from:
http://www.cisco.com/web/about/security/intelligence/firewall-best-practices.html
-
THE SANS INSTITUTE. SANS Security Consensus Operational Readiness Evaluation, Firewall Checklist. [Online] Available from:
http://www.sans.org/score/checklists/FirewallChecklist.pdf
-
DARBY, R. (2012). Cyber Defence in Focus: Enemies Near and Far–or Just Behind the Firewall: The Case for Knowledge Management. Defence Studies, 12(4), 523-538.
-
NICHO, M. (2012). Incorporating COBIT Best Practices in PCI DSS V2.0 for Effective Compliance. ISACA Journal, 1, 42.
-
SINGH, A. N., PICOT, A., KRANZ, J., GUPTA, M. P., & OJHA, A. (2013). Information Security Management (ISM) Practices: Lessons from Select Cases from India and Germany. Global Journal of Flexible Systems Management, 14(4), 225-239.
-
ROBERTSON, R. A. (2012). Security Auditing: The Need for Policies and Practices. Journal of Information Privacy & Security, 8(1).
-
WEEK, J., IVANOVA, P., WEEK, S., & MCLEOD, A. (2011). A Firewall Data Log Analysis of Unauthorized and Suspicious Traffic. Journal of Information System Security, 7(3).
Chapter 11
Footnotes
http://www.sans.org/reading-room/whitepapers/detection/host-based-intrusion-detection-overview-tripwire-intruder-alert-353
https://www.mcafee.com/japan/products/pdf/IntruVert-NextGenerationIDSWhitePaper_en.pdf
https://secure.mcafee.com/japan/products/pdf/Deciphering_Detection_Techniques-Anomaly-Based_Detection_WP_en.pdf
http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf
Additional References
-
MCAFEE NETWORK SECURITY TECHNOLOGIES GROUP & DR. FENGMIN GONG. Deciphering Detection Techniques: Part III Denial of Service Detection. [Online] Available from:
http://www.mcafee.com/japan/products/pdf/deciphering_detection_techniques-dos_detection_wp_en.pdf
-
MUKKAMALA, SRINIVAS & ANDREW SUGAND AJITH ABRAHAM. Designing Intrusion Detection Systems: Architectures, Challenges and Perspectives. Department of Computer Science, Oklahoma State University, USA. [Online] Available from:
http://wstst05.softcomputing.net/iec.pdf
-
BACE, REBECCA GURLEY. (2000). Intrusion Detection. Macmillan Technical Publishing.
-
BRACKNEY, R. (1998). Cyber-Intrusion Response. Reliable Distributed Systems.
-
THE SANS INSTITUTE. (2008). Network IDS & IPS Deployment Strategies. [Online] Available from:
http://www.sans.org/reading-room/whitepapers/intrusion/network-ids-ips-deployment-strategies-2143
-
GARCIA-TEODORO, PEDRO, ET AL. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security 28.1 (2009): 18-28.
-
THE SANS INSTITUTE. (2001). Understanding Intrusion Detection Systems. [Online] Available from:
http://www.sans.org/reading-room/whitepapers/detection/understanding-intrusion-detection-systems-337
-
THE SANS INSTITUTE. (2004). Understanding IPS and IDS: Using IPS and IDS together for Defense in Depth. [Online] Available from:
http://www.sans.org/reading-room/whitepapers/detection/understanding-ips-ids-ips-ids-defense-in-depth-1381
Chapter 12
Footnotes
http://www.ietf.org/rfc/rfc1661.txt
http://www.ietf.org/rfc/rfc2637.txt
http://www.ietf.org/rfc/rfc1994.txt
http://www.ietf.org/rfc/rfc2661.txt
http://www.ietf.org/rfc/rfc2890.txt
:
http://www.ietf.org/rfc/rfc2401.txt
http://www.ietf.org/rfc/rfc4301.txt
http://www.ietf.org/rfc/rfc4302.txt
http://www.ietf.org/rfc/rfc4303.txt
http://www.ietf.org/rfc/rfc4306.txt
http://www.ietf.org/rfc/rfc3031.txt
http://www.ietf.org/rfc/rfc4364.txt
Additional References
-
GLEESON, B., A. LIN, J. HEINANEN, G. ARMITAGE, A. MALIS & INTERNET ENGINEERING TASK FORCE. (2000). RFC 2764 - A Framework for IP Based Virtual Private Networks. [Online] Available from:
http://tools.ietf.org/html/rfc2764
-
HANKS, S., T. LI, D. FARINACCI, P. TRAINA & INTERNET ENGINEERING TASK FORCE. (1994). RFC1701 - Generic Routing Encapsulation. [Online] Available from:
http://tools.ietf.org/html/rfc1701
-
HANKS, S., T. LI, D. FARINACCI, P. TRAINA & INTERNET ENGINEERING TASK FORCE. (1994). RFC1702 - Generic Routing Encapsulation over IPv4 networks. [Online] Available from:
http://tools.ietf.org/html/rfc1702
-
SHENKER, S., C. PATRIDGE, R. GUERIN & INTERNET ENGINEERING TASK FORCE. (1997). RFC2212 - Specification of Guaranteed Quality of Service. [Online] Available from:
http://tools.ietf.org/html/rfc2212
-
PERKINS, D. OF CMU & INTERNET ENGINEERING TASK FORCE. (1990). RFC 1171 - The Point-to-Point Protocol for the Transmission of Multi-Protocol Datagrams Over Point-to-Point Links. [Online] Available from:
http://tools.ietf.org/html/rfc1171
-
HAMZEH, K., ET AL., & INTERNET ENGINEERING TASK FORCE. (1999). RFC 2637 - Point-to-Point Tunneling Protocol (PPTP). [Online] Available from:
http://tools.ietf.org/html/rfc2637
-
SIMPSON, W., OF DAYDREAMER & INTERNET ENGINEERING TASK FORCE. (1994). RFC 1661 - The Point-to-Point protocol (PPPP). [Online] Available from:
http://tools.ietf.org/html/rfc1661
-
ZORN, G., OF MICROSOFT CORP & INTERNET ENGINEERING TASK FORCE. (1999). RFC 2484 - PPP LCP International Configuration Option. [Online] Available from:
http://tools.ietf.org/html/rfc2484
-
TOWNSLEY, W., ET AL, & INTERNET ENGINEERING TASK FORCE. (1999). RFC 2661 - Layer Two Tunneling Protocol. [Online] Available from:
http://tools.ietf.org/html/rfc2661
-
DOMMETY, G., & INTERNET ENGINEERING TASK FORCE. (2000). RFC 2890 - Generic Routing Encapsulation (GRE). [Online] Available from
:
http://tools.ietf.org/html/rfc2890
-
KENT, S., R. ATKINSON & INTERNET ENGINEERING TASK FORCE. (1998). RFC 2401 - Security Architecture for the Internet Protocol. [Online] Available from:
http://tools.ietf.org/html/rfc2401
-
KENT, S., & INTERNET ENGINEERING TASK FORCE. (2005). RFC 4302 - IP Authentication Header. [Online] Available from:
http://tools.ietf.org/html/rfc4302
-
KENT, S., R. ATKINSON & INTERNET ENGINEERING TASK FORCE. RFC 2406 & RFC4303 - IP Encapsulating Security Payload (ESP). [Online] Available from: http://tools.ietf.org/html/rfc2406
-
HARKINS, D., D. CARREL & INTERNET ENGINEERING TASK FORCE. (1998). RFC 2409, RFC 4306 - The Internet Key Exchange (IKE). [Online] Available from:
http://tools.ietf.org/html/rfc2409
-
KENT, S., K. SEO & INTERNET ENGINEERING TAKS FORCE. (2005). RFC 4301, RFC 2401 - Security Architecture for the IP. [Online] Available from:
http://tools.ietf.org/html/rfc4301
-
ROSEN, E., A. VISWANATHAN, R. CALLON & INTERNET ENGINEERING TASK FORCE. (2001). RFC 3031 - MPLS Architecture. [Online] Available from:
http://tools.ietf.org/html/rfc3031
-
ROSEN, E., Y. REKHTER & INTERNET ENGINEERING TASK FORCE. RFC 4364 - BGP/MPLS VPNs. [Online] Available from:
http://tools.ietf.org/html/rfc4364
-
INTERNET ENGINEERING TASK FORCE. (2006). RFC 4364 - BGP/MPLS IP Virtual Private Networks (VPNs). [Online] Available from:
http://tools.ietf.org/html/rfc4364
-
CHANDRA, R., P. TRAINA, T. LI & INTERNET ENGINEERING TASK FORCE. (1996). RFC1997 - BGP Communities Attribute. [Online] Available from:
http://tools.ietf.org/html/rfc1997
-
CHEN, E., T. BATES & INTERNET ENGINEERING TASK FORCE. (1996). RFC1998 - An Application of the BGP Community Attribute in Multi-home Routing. [Online] Available from:
http://tools.ietf.org/html/rfc1998
-
WAITZMAN, D., C. PARTRIDGE, S. DEERING & INTERNET ENGINEERING TASK FORCE. (1988). RFC1075 - Distance Vector Multicast Routing Protocol. [Online] Available from:
http://tools.ietf.org/html/rfc1075
-
INTERNET ENGINEERING TASK FORCE. (2005). IP Security Protocol. [Online] Available from:
http://www.ietf.org/html.charters/ipsec-charter.html
-
RAJA, P. & F5 NETWORKS, INC. (2006). Rolling out New SSL VPN Service. [Online] Available from:
https://www.f5.com/pdf/white-papers/sslvpn-sp-wp.pdf
.
Chapter 13
Footnotes
http://csrc.nist.gov/publications/PubsSPs.html
:
http://csrc.nist.gov/publications/PubsSPs.html
http://csrc.nist.gov/publications/nistpubs/800-146/SP800-146.pdf
References
Chapter 14
Footnotes
References
Additional References
-
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY. Special Publication 800-12: Introduction to Computer Security: The NIST Handbook – Chapter 15. [Online] Available from:
http://csrc.nist.gov/publications/nistpubs/800-12/800-12-html/chapter15.html
-
JAIN, A. K., A. ROSS, & S. PRABHAKAR. (2004). An Introduction to Biometric Recognition. IEEE Trans. on Circuits and Systems for Video Technology, Special Issue on Image and Video-Based Biometrics, vol. 14, no. 1, pp. 4-20, January 2004. [Online] Available from:
http://ieeexplore.ieee.org/iel5/76/28212/01262027.pdf
Chapter 15
Footnotes
Additional References
-
LUO, XIN (ROBERT), RICHARD BRODY., ALESSANDRO SEAZZU., & STEPHEN BURD - ALL OF THE UNIVERSITY OF NEW MEXICO, USA. (2011). Social Engineering: The Neglected Human Factor for Information Security Management. Information Resources Management Journal, 24(3), 1-8, July-September 2011. [Online] Available from: http://scholar.google.co.in/scholar?q=social+engineering+neglected+human+factor&btnG=&hl=en&as_sdt=0%2C5&as_ylo=2010/IRMJ2011.pdf
-
DIMKOV., T., WOLTER PIETERS, PIETER HARTEL OF UNIVERSITY OF TWENTE, THE NETHERLANDS. (2010). Two methodologies for physical penetration testing using social engineering. [Online] Available from: http://scholar.google.co.in/scholar?q=social+engineering+two+methodologies+for+physical+penetration+testing&btnG=&hl=en&as_sdt=0%2C5&as_ylo=2010
-
MAAN., P.S., MANISH SHARMA. OF DAV INSTITUTE OF ENGINEERING AND TECHNOLOGY, PUNJAB TECHNICAL UNIVERSTIY, INDIA. (2012). Social Engineering: A Partial Technical Attack. IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 3, March 2012. [Online] Available from: http://scholar.google.co.in/scholar?q=social+engineering+a+partial+technical+attack&btnG=&hl=en&as_sdt=0%2C5&as_ylo=2010
-
HASAN, M., NILESH PRAJAPATI, & SAFVAN VOHARA OF BVM ENGINEERING COLLEGE, INDIA. Case Study On Social Engineering Techniques For Persuasion. International journal on applications of graph theory in wireless ad hoc networks and sensor networks. [Online] Available from:
http://scholar.google.co.in/scholar?as_ylo=2010&q=case+study+on+social+engineering&hl=en&as_sdt=0,5
Chapter 16
Footnotes
http://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=10&sqi=2&ved=0CFQQFjAJ&url=http%3A%2F%2Fwww.nsa.gov%2Fia%2F_files%2Ffactsheets%2FI732-016R-07.pdf&ei=d294U9XHB8aLuATj_YJ4&usg=AFQjCNFc2CXHzjfl27QVF7gBZuZonc9tKQ