1
by Timm, Carl
Published 2010
Syngress/Elsevier
Table of Contents: ...Social networking infrastructure attacks -- Malware attacks -- Phishing attacks -- Evil twin...

2
Published 2009
IT Governance Pub.
Table of Contents: ...; Malware and blended attacks; Hacking attacks; Phishing; Social engineering; Loss of productivity...

3
by Gillis, Tom
Published 2010
Cisco Press
Table of Contents: ... : malware -- Who are these guys? -- Signs of hope -- Acceptable use policies -- The realities of data loss...

4
by Rothrock, Ray A.
Published 2018
American Management Association
... and effectively Data theft. Downed servers. Malware. Even human error can trigger cyber events anytime from...