REFERENCES
- Cole , E. and Ring , S. 2006 . “ Insider threat: Protecting the enterprise from sabotage, spying, and theft ” . Rockland, MA : Syngress .
- Contos , B. T. 2006 . “ Enemy at the water cooler: Real-life stories of insider threats and enterprise security management countermeasures ” . Rockland, MA : Syngress .
- Hitchcock , J. A. 2006 . Net crimes & misdemeanors: Outmaneuvering Web spammers, stalkers, and con artists , 2nd , Medford, NJ : Information Today Inc .
- ISO/IEC 27002:2005 . International standard—information security—security techniques—code of practice for information security management , Geneva, , Switzerland : ISO/IEC .
- Lininger , R. and Vines , R. D. 2005 . Phishing: cutting the identity theft line. , Indianapolis, IN : Wiley. .
- Marks, N. D. (2008). Personal communication to the author by e-mail. January 6, 2008
- Microsoft (2006). How to protect insiders from social engineering threats http://www.microsoft.com/downloads/details.aspx?familyid=05033e55-aa96-4d49-8f57-c47664107938&displaylang=en (www.microsoft.com/downloads/details.aspx?familyid=05033e55-aa96-4d49-8f57-c47664107938displaylang=en) (Accessed: 4 January 2008 ).
- Mitnick , K. D. and Simon , W. L. 2002 . The art of deception: Controlling the human element of security. , Indianapolis, IN : Wiley .
- Mitnick , K. D. and Simon , W. L. 2005 . The art of intrusion: The real stories behind the exploits of hackers, intruders, and deceivers. , Indianapolis, IN : Wiley .
- Mitnick, K. D. Quoted by Talyn Halkin in The Jerusalem Post 2006, February 24 http//www.jpost.com/servlet/satellite?cid=1139395477381&pagename=Jpost%2FJPArticle%2FShowFull
- Peltier , T. R. 2001 . Information security policies, procedures, and standards: Guidelines for effective information security management , Boca Raton, FL : Auerbach .
- Ramamoorti , S. and Olsen , W. 2007 . “ Fraud: The human factor ” . In Financial Executive 53 – 55 . (July/August)
- Rossiter, J. (2007). Secrets of Shell and Rolls-Royce come under attack from China's spies.” from http://business.timesonline.co.uk/tol/business/markets/china/article2988228.ece (Accessed: 4 January 2008 ).
- Schneier , B. 2000 . Secrets & lies: Digital security in a networked world. , Indianapolis, IN : Wiley .
- Schneier , B. 2003 . Beyond fear: Thinking sensibly about security in an uncertain world. , New York : Copernicus Books .
- Spitzner , L. 2003 . Honeypots: tracking hackers. , Boston, MA : Addison-Wesley .
- Stasiukonis, S. (2006). Banking on security. http://www.darkreading.com/document.asp?doc_id=111503 (Accessed: 4 January 2008 ).
- The Honeynet Project . 2004 . Know your enemy: Learning about security threats , 2nd , Boston, MA : Addison-Wesley .
- Wikipedia (2008). Entry for social engineering (security) http://en.wikipedia.org/wiki/Social_engineering_%28security%29 (Accessed: 4 January 2008 ).
- Winkler , I. 1997 . Corporate espionage: What it is, why it's happening in your company, what you must do about it. , Rocklin, CA : Prima .
- Winkler , I . 2005 . Spies among us: How to stop the spies, terrorists, hackers and criminals you don't even know you encounter every day. , Indianapolis, IN : Wiley .