Seuraa
Ira Winkler
Ira Winkler
Muut nimetIra S, Winkler
Executive Director, Human Security Engineering Consortium
Vahvistettu sähköpostiosoite verkkotunnuksessa securementem.com
Nimike
Viittaukset
Viittaukset
Vuosi
Corporate Espionage: what it is, why it is happening in your company, what you must do about it
I Winkler
Prima Lifestyles, 1997
1311997
Information Security Technology? Don't Rely on It. A Case Study in Social Engineering.
IS Winkler, B Dealy
USENIX Security Symposium 5, 1-1, 1995
1201995
Spies among us: how to stop the spies, terrorists, hackers, and criminals you don't even know you encounter every day
I Winkler
John Wiley & Sons, 2005
362005
The non-technical threat to computing systems
IS Winkler
Computing systems 9 (1), 3-14, 1996
351996
Advanced persistent security: a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
I Winkler, AT Gomes
Syngress, 2016
332016
Case study of industrial espionage through social engineering
IS Winkler
Proceedings of the 19 th Information Systems Security Conference, 1-7, 1996
321996
Through the Eyes of the Enemy: Russia's Highest Ranking Military Defector Reveals why Russia is More Dangerous Than Ever
S Lunev, I Winkler
Regnery Publishing, 1998
231998
The habits of highly successful security awareness programs: A cross-company comparison
S Manke, I Winkler
Securementem, Retrieved April 12, 2016, 2013
192013
Zen and the art of information security
I Winkler
Elsevier, 2011
162011
HCI challenges in government contracting: a CHI'95 workshop
I Winkler, E Buie
ACM SIGCHI Bulletin 27 (4), 35-37, 1995
121995
HCI challenges in government contracting: a CHI'94 SIG report
E Buie, I Winkler
ACM SIGCHI Bulletin 26 (4), 49-50, 1994
91994
Adversary infrastructure
I Winkler, AT Gomes
Advanced persistent security: a cyberwarfare approach to implementing …, 2017
72017
Reasons for security awareness failure
I Winkler, S Manke
CSO Security and Risk 7, 2013
72013
Social engineering through human intelligence
I Winkler, L Hayden
The Information Systems Security Association Journal, 6-8, 2005
72005
Chapter 5-how to hack computers
I Winkler, AT Gomes
Advanced Persistent Security, 41-46, 2017
62017
Audits, Assessments & Tests (Oh, My)
I Winkler
Information Security Magazine, 2000
62000
Social engineering: The only real test of information systems security plans
IS Winkler
Proceedings 18th NISTNCSC National Information Systems Security Conference …, 1995
51995
Jul. 2000.“Audits, Assessments & Tests (Oh My).”
I Winkler, A Berg, G Kurtz, C Prosise, D Swanson
5
The Human Exploitation Kill Chain
I Winkler
Video), RSA Conference, 2017
42017
Cybersecurity All-in-one for Dummies
J Steinberg, K Beaver, I Winkler, T Coombs
John Wiley & Sons, 2023
22023
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20