Securing the Clicks Network Security in the Age of Social Media
Sorozatcím: NETWORKING & COMM - OMG;
-
10% KEDVEZMÉNY?
- A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
- Kiadói listaár GBP 30.99
-
14 805 Ft (14 100 Ft + 5% áfa)
Az ár azért becsült, mert a rendelés pillanatában nem lehet pontosan tudni, hogy a beérkezéskor milyen lesz a forint árfolyama az adott termék eredeti devizájához képest. Ha a forint romlana, kissé többet, ha javulna, kissé kevesebbet kell majd fizetnie.
- Kedvezmény(ek) 10% (cc. 1 481 Ft off)
- Kedvezményes ár 13 325 Ft (12 690 Ft + 5% áfa)
Iratkozzon fel most és részesüljön kedvezőbb árainkból!
Feliratkozom
14 805 Ft
Beszerezhetőség
Becsült beszerzési idő: Várható beérkezés: 2026. január vége.
A Prosperónál jelenleg nincsen raktáron.
Why don't you give exact delivery time?
A beszerzés időigényét az eddigi tapasztalatokra alapozva adjuk meg. Azért becsült, mert a terméket külföldről hozzuk be, így a kiadó kiszolgálásának pillanatnyi gyorsaságától is függ. A megadottnál gyorsabb és lassabb szállítás is elképzelhető, de mindent megteszünk, hogy Ön a lehető leghamarabb jusson hozzá a termékhez.
A termék adatai:
- Kiadó McGraw Hill
- Megjelenés dátuma 2011. december 16.
- ISBN 9780071769051
- Kötéstípus Puhakötés
- Terjedelem368 oldal
- Méret 231x185x17 mm
- Súly 637 g
- Nyelv angol 0
Kategóriák
Rövid leírás:
This timely book on social media security risks offers practical, proven methods for assessing the risks posed to corporate networks and how to develop and implement airtight measures and policies to secure those networks while leveraging interdepartmental collaboration.
TöbbHosszú leírás:
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Defend against corporate espionage launched from social networks
Protect your organization from devastating social media attacks with instruction from a team of information security experts. Securing the Clicks: Network Security in the Age of Social Media explains the latest threats along with detailed fixes, best practices, and "from the headlines" case studies. Find out how to analyze risk, implement robust security protocols, and enforce social media usage policies. Regulatory compliance, online reputation management, and incident response are also covered in this comprehensive volume.
- Assess your global social media presence and identify vulnerabilities
- Establish solid security policies at every level of your organization
- Allocate resources for planning, administration, and corrective action
- Monitor usage by employees, clients, competitors, and the public
- Block cyberstalking. phishing, malware, and identity theft exploits
- Guard intellectual property rights, trademarks, copyrights, and logos
- Preserve your brand image using online reputation management tools
Gary Bahadur is the founder and CEO of KRAA Security [www.kraasecurity.com/social-media-security], which protects organizations from threats through a combination of prevention services. He was the cofounder and CIO of Foundstone, Inc.
Jason Inasi is CEO and cofounder of The Factory Interactive {www.thefactoryi.com], a digital design and marketing agency, and president of Inasi Group, an international, multidisciplinary, technology advisory firm.
Alex de Carvalho is vice president of business development and community at VoxMed, cofounder of The Startup Forum, director of social media at Medimix International, and adjunct professor of social media at the University of Miami.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Defend against corporate espionage launched from social networks
Protect your organization from devastating social media attacks with instruction from a team of information security experts. Securing the Clicks: Network Security in the Age of Social Media explains the latest threats along with detailed fixes, best practices, and "from the headlines" case studies. Find out how to analyze risk, implement robust security protocols, and enforce social media usage policies. Regulatory compliance, online reputation management, and incident response are also covered in this comprehensive volume.
- Assess your global social media presence and identify vulnerabilities
- Establish solid security policies at every level of your organization
- Allocate resources for planning, administration, and corrective action
- Monitor usage by employees, clients, competitors, and the public
- Block cyberstalking. phishing, malware, and identity theft exploits
- Guard intellectual property rights, trademarks, copyrights, and logos
- Preserve your brand image using online reputation management tools
Gary Bahadur is the founder and CEO of KRAA Security [www.kraasecurity.com/social-media-security], which protects organizations from threats through a combination of prevention services. He was the cofounder and CIO of Foundstone, Inc.
Jason Inasi is CEO and cofounder of The Factory Interactive {www.thefactoryi.com], a digital design and marketing agency, and president of Inasi Group, an international, multidisciplinary, technology advisory firm.
Alex de Carvalho is vice president of business development and community at VoxMed, cofounder of The Startup Forum, director of social media at Medimix International, and adjunct professor of social media at the University of Miami.
TöbbTartalomjegyzék:
Part I: Assessing Social Media Security
Chapter 1. The Social Media Security Process
Chapter 2. Security Strategy Analysis: Foundation of Your Security Policy
Chapter 3. Monitoring in the Social Media Landscape
Part II: Assessing Social Media Threats
Chapter 4. Threat Assessment
Chapter 5. What Can Go Wrong
Part III: Operations, Policies, & Processes
Chapter 6. Social Media Security Policy Best Practices
Chapter 7. Human Resources: Strategy & Collaboration
Chapter 8. Utilization of Resources: Strategy & Collaboration
Chapter 9. Monetary Considerations: Strategy & Collaboration
Chapter 10. Operations Management: Strategy & Collaboration
Chapter 11. Reputation Management: Strategy & Collaboration
Part IV: Monitoring & Reporting
Chapter 12. Human Resources Monitoring & Reporting
Chapter 13. Utilization Monitoring & Reporting
Chapter 14. Monetary Monitoring & Reporting
Chapter 15. Operations Management Monitoring & Reporting
Chapter 16. Reputation Management Monitoring & Reporting
Part V: Social Media 3.0
Chapter 17. Assessing Your Social Media Strategy
Chapter 18. The Future of Social Media Security
Appendix: Resource Guide
Index