000 02093cam a2200325 a 4500
001 17031161
005 20240318183455.0
008 111102s2012 nyua b 001 0 eng
010 _a 2011040257
020 _a9780071769051 (pbk. : alk. paper)
020 _a0071769056 (alk. paper)
040 _aDLC
_cDLC
_dABK
_eRDA
042 _apcc
050 0 0 _aTK5105.59
_b.S437 2012
082 0 0 _223
_a005.8
_bBAH
100 _aBahadur, Gary
_9969
245 0 0 _aSecuring the clicks :
_bnetwork security in the age of social media /
260 _aNew York :
_bMcGraw-Hill,
_cc2012.
300 _axxv, 341 pages :
_billustration ;
_c23 cm.
504 _aIncludes bibliographical references and index.
505 _aThe social media security process Security strategy analysis : foundation of your security policy Monitoring in the social media landscape Threat assessment What can go wrong Social media security policy best practices Human resources : strategy & collaboration Utilization of resources : strategy & collaboration Monetary considerations : strategy & collaboration Operations management : strategy & collaboration Reputation management : strategy & collaboration Human resources monitoring & reporting Utilization monitoring & reporting Monetary monitoring & reporting Operations management monitoring & reporting Reputation management monitoring & reporting Assessing your social media strategy The future of social media security
520 _aExplaining the latest threats along with detailed fixes; best practices; and from the headlines case studies; this comprehensive guide will show you how to analyze risk; implement robust security protocols; and enforce social media usage policies. -- Edited summary from book
650 0 _aComputer networks
_xSecurity measures.
_9970
650 0 _aSocial media
_xSecurity measures.
_9971
700 1 _aInasi, Jason
_9972
700 1 _aCarvalho, Alex de
_9973
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBOOK
999 _c36635
_d36634