Securing the Clicks Network Security in the Age of Social Media
Series: NETWORKING & COMM - OMG;
- Publisher's listprice GBP 30.99
-
14 805 Ft (14 100 Ft + 5% VAT)
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 10% (cc. 1 481 Ft off)
- Discounted price 13 325 Ft (12 690 Ft + 5% VAT)
Subcribe now and take benefit of a favourable price.
Subscribe
14 805 Ft
Availability
Estimated delivery time: Expected time of arrival: end of January 2026.
Not in stock at Prospero.
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Publisher McGraw Hill
- Date of Publication 16 December 2011
- ISBN 9780071769051
- Binding Paperback
- No. of pages368 pages
- Size 231x185x17 mm
- Weight 637 g
- Language English 0
Categories
Short description:
This timely book on social media security risks offers practical, proven methods for assessing the risks posed to corporate networks and how to develop and implement airtight measures and policies to secure those networks while leveraging interdepartmental collaboration.
MoreLong description:
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Defend against corporate espionage launched from social networks
Protect your organization from devastating social media attacks with instruction from a team of information security experts. Securing the Clicks: Network Security in the Age of Social Media explains the latest threats along with detailed fixes, best practices, and "from the headlines" case studies. Find out how to analyze risk, implement robust security protocols, and enforce social media usage policies. Regulatory compliance, online reputation management, and incident response are also covered in this comprehensive volume.
- Assess your global social media presence and identify vulnerabilities
- Establish solid security policies at every level of your organization
- Allocate resources for planning, administration, and corrective action
- Monitor usage by employees, clients, competitors, and the public
- Block cyberstalking. phishing, malware, and identity theft exploits
- Guard intellectual property rights, trademarks, copyrights, and logos
- Preserve your brand image using online reputation management tools
Gary Bahadur is the founder and CEO of KRAA Security [www.kraasecurity.com/social-media-security], which protects organizations from threats through a combination of prevention services. He was the cofounder and CIO of Foundstone, Inc.
Jason Inasi is CEO and cofounder of The Factory Interactive {www.thefactoryi.com], a digital design and marketing agency, and president of Inasi Group, an international, multidisciplinary, technology advisory firm.
Alex de Carvalho is vice president of business development and community at VoxMed, cofounder of The Startup Forum, director of social media at Medimix International, and adjunct professor of social media at the University of Miami.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Defend against corporate espionage launched from social networks
Protect your organization from devastating social media attacks with instruction from a team of information security experts. Securing the Clicks: Network Security in the Age of Social Media explains the latest threats along with detailed fixes, best practices, and "from the headlines" case studies. Find out how to analyze risk, implement robust security protocols, and enforce social media usage policies. Regulatory compliance, online reputation management, and incident response are also covered in this comprehensive volume.
- Assess your global social media presence and identify vulnerabilities
- Establish solid security policies at every level of your organization
- Allocate resources for planning, administration, and corrective action
- Monitor usage by employees, clients, competitors, and the public
- Block cyberstalking. phishing, malware, and identity theft exploits
- Guard intellectual property rights, trademarks, copyrights, and logos
- Preserve your brand image using online reputation management tools
Gary Bahadur is the founder and CEO of KRAA Security [www.kraasecurity.com/social-media-security], which protects organizations from threats through a combination of prevention services. He was the cofounder and CIO of Foundstone, Inc.
Jason Inasi is CEO and cofounder of The Factory Interactive {www.thefactoryi.com], a digital design and marketing agency, and president of Inasi Group, an international, multidisciplinary, technology advisory firm.
Alex de Carvalho is vice president of business development and community at VoxMed, cofounder of The Startup Forum, director of social media at Medimix International, and adjunct professor of social media at the University of Miami.
MoreTable of Contents:
Part I: Assessing Social Media Security
Chapter 1. The Social Media Security Process
Chapter 2. Security Strategy Analysis: Foundation of Your Security Policy
Chapter 3. Monitoring in the Social Media Landscape
Part II: Assessing Social Media Threats
Chapter 4. Threat Assessment
Chapter 5. What Can Go Wrong
Part III: Operations, Policies, & Processes
Chapter 6. Social Media Security Policy Best Practices
Chapter 7. Human Resources: Strategy & Collaboration
Chapter 8. Utilization of Resources: Strategy & Collaboration
Chapter 9. Monetary Considerations: Strategy & Collaboration
Chapter 10. Operations Management: Strategy & Collaboration
Chapter 11. Reputation Management: Strategy & Collaboration
Part IV: Monitoring & Reporting
Chapter 12. Human Resources Monitoring & Reporting
Chapter 13. Utilization Monitoring & Reporting
Chapter 14. Monetary Monitoring & Reporting
Chapter 15. Operations Management Monitoring & Reporting
Chapter 16. Reputation Management Monitoring & Reporting
Part V: Social Media 3.0
Chapter 17. Assessing Your Social Media Strategy
Chapter 18. The Future of Social Media Security
Appendix: Resource Guide
Index