000 03116cam a2200517Ii 4500
001 ocn918135805
003 OCoLC
005 20190328114812.0
006 m o d
007 cr cnu|||unuuu
008 150813s2015 mau o 000 0 eng d
040 _aN$T
_beng
_erda
_epn
_cN$T
_dEBLCP
_dN$T
_dYDXCP
_dIDEBK
_dUMI
_dTEFOD
_dUIU
_dDEBSZ
_dOCLCF
_dCDX
_dDEBBG
_dD6H
_dFEM
_dOCLCQ
_dMERUC
_dCOO
_dOCLCQ
_dOCLCA
_dREB
_dWRM
_dU3W
_dCEF
_dOCLCQ
_dCUY
_dLOA
_dZCU
_dG3B
_dCNCEN
_dS8J
_dICG
_dK6U
_dCOCUF
_dCNNOR
_dDKC
019 _a919204868
_a968075310
_a969005155
020 _a9780128041963
_q(electronic bk.)
020 _a012804196X
_q(electronic bk.)
020 _a0128041803
020 _a9780128041802
020 _z9780128041802
035 _a(OCoLC)918135805
_z(OCoLC)919204868
_z(OCoLC)968075310
_z(OCoLC)969005155
050 4 _aHM742
_b.D35 2015eb
072 7 _aPSY
_x031000
_2bisacsh
082 0 4 _a302.30285
_223
100 1 _aDalziel, Henry,
_eauthor.
245 1 0 _aSecuring social media in the enterprise /
_h[electronic resource]
_cHenry Dalziel ; contributing editor, Nicholas Arvanitis.
264 1 _aWaltham, MA :
_bElsevier :
_bSyngress,
_c2015
264 4 _c�2015
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_2rda
588 0 _aVendor-supplied metadata.
520 _aSecuring Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise. Teaches how to: Use of social engineering techniques, Mimic threat behaviours, Categorize different classes of attacks (e.g., passive, active, insider, close-in, distribution, etc.), Quantify different operational threat environments, Categorize general attack stages.
505 0 _aThe typical approach -- Red team assessment -- Elements for success -- Who are weup against -- Things to keep in mind -- High risk of low risk -- Composite attacks.
650 0 _aSocial media.
650 0 _aComputer security.
650 7 _aPSYCHOLOGY
_xSocial Psychology.
_2bisacsh
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
650 7 _aSocial media.
_2fast
_0(OCoLC)fst01741098
650 7 _aIT-s�akerhet.
_2sao
650 7 _aSociala medier.
_2sao
655 4 _aElectronic books.
655 7 _aElectronic books.
_2lcgft
776 0 8 _iPrint version:
_aDalziel, Henry.
_tSecuring social media in the enterprise.
_dWaltham, MA : Elsevier : Syngress, [2015]
_z9780128041963
_w(OCoLC)918135805
856 4 0 _3ScienceDirect
_uhttp://www.sciencedirect.com/science/book/9780128041802
999 _c247133
_d247133