-
1“... employee of the institution; (ii) fake sequestration; (iii) bug coup; (iv) use of phishing; (v) social...”
Mais informações
bachelorThesis -
2“... happens with phishing, the leakage of personal data, the ransomware attack and the spoofing attack...”
Mais informações
bachelorThesis