Return to Article Details The analysis of the information systems' users' groups protection analysis from the social engineering attacks: the principle and program implementation Download Download PDF