Request a copy of the file
Enter the following information to request a copy for the following item: Information security threat assessment using social engineering in the organizational context: literature review
Requesting the following file: Social Engeneering Threats.pdf