共 8 条
- [1] Anup G.C., 2013, CREDIT CARD SECURITY
- [2] Bhusari V., 2011, INT J COMPUTER APPL, V20
- [3] Hadnagy C., 2011, Social Engineering: The Art of Human Hacking
- [4] Harrell E., 2015, VICTIMS IDENTITY THE, P1
- [5] Hedayati A., 2012, Journal of Law and Conflict Resolution, V4, P1, DOI DOI 10.5897/JLCR11.044
- [6] Reddy V. L., 2015, INT J COMPUTER APPL, V124
- [7] Williams BR, 2012, PCI COMPLIANCE UNDER
- [8] Yadva A., 2013, BACKGROUND RANDOM NU