Corporate Espionage: what it is, why it is happening in your company, what you must do about it I Winkler Prima Lifestyles, 1997 | 131 | 1997 |
Information Security Technology? Don't Rely on It. A Case Study in Social Engineering. IS Winkler, B Dealy USENIX Security Symposium 5, 1-1, 1995 | 120 | 1995 |
Spies among us: how to stop the spies, terrorists, hackers, and criminals you don't even know you encounter every day I Winkler John Wiley & Sons, 2005 | 36 | 2005 |
The non-technical threat to computing systems IS Winkler Computing systems 9 (1), 3-14, 1996 | 35 | 1996 |
Case study of industrial espionage through social engineering IS Winkler Proceedings of the 19 th Information Systems Security Conference, 1-7, 1996 | 34 | 1996 |
Advanced persistent security: a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies I Winkler, AT Gomes Syngress, 2016 | 33 | 2016 |
Through the Eyes of the Enemy: Russia's Highest Ranking Military Defector Reveals why Russia is More Dangerous Than Ever S Lunev, I Winkler Regnery Publishing, 1998 | 23 | 1998 |
The habits of highly successful security awareness programs: A cross-company comparison S Manke, I Winkler Securementem, Retrieved April 12, 2016, 2013 | 19 | 2013 |
Zen and the art of information security I Winkler Elsevier, 2011 | 16 | 2011 |
HCI challenges in government contracting: a CHI'95 workshop I Winkler, E Buie ACM SIGCHI Bulletin 27 (4), 35-37, 1995 | 12 | 1995 |
HCI challenges in government contracting: a CHI'94 SIG report E Buie, I Winkler ACM SIGCHI Bulletin 26 (4), 49-50, 1994 | 9 | 1994 |
Adversary infrastructure I Winkler, AT Gomes Advanced persistent security: a cyberwarfare approach to implementing …, 2017 | 7 | 2017 |
Reasons for security awareness failure I Winkler, S Manke CSO Security and Risk 7, 2013 | 7 | 2013 |
Social engineering through human intelligence I Winkler, L Hayden The Information Systems Security Association Journal, 6-8, 2005 | 7 | 2005 |
Chapter 5-how to hack computers I Winkler, AT Gomes Advanced Persistent Security, 41-46, 2017 | 6 | 2017 |
Audits, Assessments & Tests (Oh, My) I Winkler Information Security Magazine, 2000 | 6 | 2000 |
Social engineering: The only real test of information systems security plans IS Winkler Proceedings 18th NISTNCSC National Information Systems Security Conference …, 1995 | 5 | 1995 |
Jul. 2000.“Audits, Assessments & Tests (Oh My).” I Winkler, A Berg, G Kurtz, C Prosise, D Swanson | 5 | |
The Human Exploitation Kill Chain I Winkler Video), RSA Conference, 2017 | 4 | 2017 |
Cybersecurity All-in-one for Dummies J Steinberg, K Beaver, I Winkler, T Coombs John Wiley & Sons, 2023 | 2 | 2023 |