Securing social media in the enterprise
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide ran...
Saved in:
| Main Author: | Dalziel, Henry (Author) |
|---|---|
| Other Authors: | Arvanitis, Nicholas (Editor) |
| Format: | Book |
| Language: | English |
| Published: |
Waltham, MA
Syngress
2015
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Social Media security leveraging social networking while mitigating
by: Cross, Michael 1965-
Published: (2013)
by: Cross, Michael 1965-
Published: (2013)
Media jaringan sosial penggunaan dan pengaruhnya
by: Siti Ezaleila Mustafa
Published: (2015)
by: Siti Ezaleila Mustafa
Published: (2015)
Computing and building around tie strength in social media
by: Gilbert, Eric, et al.
Published: (2014)
by: Gilbert, Eric, et al.
Published: (2014)
Strategic Social Media Management : Theory and Practice /
by: Sutherland, Karen E.
Published: (2024)
by: Sutherland, Karen E.
Published: (2024)
Online social networks human cognitive constraints in Facebook and Twitter personal graphs
by: Arnaboldi, Valerio, et al.
Published: (2015)
by: Arnaboldi, Valerio, et al.
Published: (2015)
Social media and the rise of terrorism the impact towards national security in Malaysia
by: Mohd. Shahrizal Abd. Aziz
Published: (2023)
by: Mohd. Shahrizal Abd. Aziz
Published: (2023)
Social media data extraction and content analysis
Published: (2017)
Published: (2017)
Using new media for citizen engagement and participation
Published: (2020)
Published: (2020)
Social media influence on election campaign
by: Mohammad Adib Khairuddin
Published: (2023)
by: Mohammad Adib Khairuddin
Published: (2023)
Cyber security management a governance, risk and compliance framework
by: Trim, Peter R. J., et al.
Published: (2014)
by: Trim, Peter R. J., et al.
Published: (2014)
Minda komuniti maya
by: Jusang Bolong
Published: (2011)
by: Jusang Bolong
Published: (2011)
Network attacks and exploitation a framework
by: Monte, Matthew
Published: (2015)
by: Monte, Matthew
Published: (2015)
Network security attacks and countermeasures
Published: (2016)
Published: (2016)
Advances in enterprise information technology security
Published: (2007)
Published: (2007)
Applied network security master the art of detecting and averting advanced network security attacks and techniques
by: Salmon, Arthur, et al.
Published: (2017)
by: Salmon, Arthur, et al.
Published: (2017)
Next generation red teaming
by: Dalziel, Henry
Published: (2015)
by: Dalziel, Henry
Published: (2015)
Security and privacy in social networks
Published: (2013)
Published: (2013)
Business data networks and security
by: Panko, Raymond R., et al.
Published: (2015)
by: Panko, Raymond R., et al.
Published: (2015)
Cyber security economic strategies and public policy alternatives
by: Gallaher, Michael P.
Published: (2008)
by: Gallaher, Michael P.
Published: (2008)
Learning network forensics identify and safeguard your network against both internal and external threats, hackers, and malware attacks
by: Datt, Samir
Published: (2016)
by: Datt, Samir
Published: (2016)
Countering cyber attacks and preserving the integrity and availability of critical systems
Published: (2019)
Published: (2019)
Security awareness applying practical security in your world
by: Ciampa, Mark D.
Published: (2010)
by: Ciampa, Mark D.
Published: (2010)
Cyberspace and cybersecurity
by: Kostopoulos, George K.
Published: (2018)
by: Kostopoulos, George K.
Published: (2018)
Secrets and lies digital security in a networked world
by: Schneier, Bruce 1963-
Published: (2000)
by: Schneier, Bruce 1963-
Published: (2000)
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)
Published: (2018)
Cybersecurity managing systems,conducting testing, and investigating intrusions
by: Mowbray, Thomas J.
Published: (2014)
by: Mowbray, Thomas J.
Published: (2014)
Strategic cyber deterrence the active cyber defense option
by: Jasper, Scott
Published: (2017)
by: Jasper, Scott
Published: (2017)
Practical Industrial Internet of Things security practitioner's guide to securing connected industries
by: Bhattacharjee, Sravani
Published: (2018)
by: Bhattacharjee, Sravani
Published: (2018)
Cybersecurity Strategies and Best Practices : A comprehensive guide to mastering enterprise cyber defense tactics and techniques /
by: Aslaner, Milad
Published: (2024)
by: Aslaner, Milad
Published: (2024)
Cyber security culture counteracting cyber threats through organizational learning and training /cby Peter Trim and David Upton
by: Trim, Peter R. J.
Published: (2013)
by: Trim, Peter R. J.
Published: (2013)
Cyber crime, security and digital intelligence
by: Johnson, Mark
Published: (2013)
by: Johnson, Mark
Published: (2013)
Information security management global challenges in 21st century
by: Goel, Suresh
Published: (2009)
by: Goel, Suresh
Published: (2009)
Cyber security and IT infrastructure protection
Published: (2014)
Published: (2014)
Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics
by: Diogenes, Yuri, et al.
Published: (2018)
by: Diogenes, Yuri, et al.
Published: (2018)
Hacking exposed mobile security secrets & solutions
by: Bergman, Neil
Published: (2013)
by: Bergman, Neil
Published: (2013)
Cyber security practitioner's guide
Published: (2020)
Published: (2020)
Hacking web apps detecting and preventing web application security problems
by: Shema, Mike
Published: (2012)
by: Shema, Mike
Published: (2012)
Cybersecurity public sector threats and responses
Published: (2012)
Published: (2012)
Designing quality of service solutions for the enterprise
by: SiegellhEric D.
by: SiegellhEric D.
Cybersecurity attack and defense strategies
by: Yuri, Diogenes, et al.
Published: (2019)
by: Yuri, Diogenes, et al.
Published: (2019)
Similar Items
-
Social Media security leveraging social networking while mitigating
by: Cross, Michael 1965-
Published: (2013) -
Media jaringan sosial penggunaan dan pengaruhnya
by: Siti Ezaleila Mustafa
Published: (2015) -
Computing and building around tie strength in social media
by: Gilbert, Eric, et al.
Published: (2014) -
Strategic Social Media Management : Theory and Practice /
by: Sutherland, Karen E.
Published: (2024) -
Online social networks human cognitive constraints in Facebook and Twitter personal graphs
by: Arnaboldi, Valerio, et al.
Published: (2015)


