000 | 02093cam a2200325 a 4500 | ||
---|---|---|---|
001 | 17031161 | ||
005 | 20240318183455.0 | ||
008 | 111102s2012 nyua b 001 0 eng | ||
010 | _a 2011040257 | ||
020 | _a9780071769051 (pbk. : alk. paper) | ||
020 | _a0071769056 (alk. paper) | ||
040 |
_aDLC _cDLC _dABK _eRDA |
||
042 | _apcc | ||
050 | 0 | 0 |
_aTK5105.59 _b.S437 2012 |
082 | 0 | 0 |
_223 _a005.8 _bBAH |
100 |
_aBahadur, Gary _9969 |
||
245 | 0 | 0 |
_aSecuring the clicks : _bnetwork security in the age of social media / |
260 |
_aNew York : _bMcGraw-Hill, _cc2012. |
||
300 |
_axxv, 341 pages : _billustration ; _c23 cm. |
||
504 | _aIncludes bibliographical references and index. | ||
505 | _aThe social media security process Security strategy analysis : foundation of your security policy Monitoring in the social media landscape Threat assessment What can go wrong Social media security policy best practices Human resources : strategy & collaboration Utilization of resources : strategy & collaboration Monetary considerations : strategy & collaboration Operations management : strategy & collaboration Reputation management : strategy & collaboration Human resources monitoring & reporting Utilization monitoring & reporting Monetary monitoring & reporting Operations management monitoring & reporting Reputation management monitoring & reporting Assessing your social media strategy The future of social media security | ||
520 | _aExplaining the latest threats along with detailed fixes; best practices; and from the headlines case studies; this comprehensive guide will show you how to analyze risk; implement robust security protocols; and enforce social media usage policies. -- Edited summary from book | ||
650 | 0 |
_aComputer networks _xSecurity measures. _9970 |
|
650 | 0 |
_aSocial media _xSecurity measures. _9971 |
|
700 | 1 |
_aInasi, Jason _9972 |
|
700 | 1 |
_aCarvalho, Alex de _9973 |
|
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
942 |
_2ddc _cBOOK |
||
999 |
_c36635 _d36634 |