Return to Article Details Detection of vulnerabilities of the computer systems and networks using social engineering techniques Download Download PDF