000 | 03116cam a2200517Ii 4500 | ||
---|---|---|---|
001 | ocn918135805 | ||
003 | OCoLC | ||
005 | 20190328114812.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 150813s2015 mau o 000 0 eng d | ||
040 |
_aN$T _beng _erda _epn _cN$T _dEBLCP _dN$T _dYDXCP _dIDEBK _dUMI _dTEFOD _dUIU _dDEBSZ _dOCLCF _dCDX _dDEBBG _dD6H _dFEM _dOCLCQ _dMERUC _dCOO _dOCLCQ _dOCLCA _dREB _dWRM _dU3W _dCEF _dOCLCQ _dCUY _dLOA _dZCU _dG3B _dCNCEN _dS8J _dICG _dK6U _dCOCUF _dCNNOR _dDKC |
||
019 |
_a919204868 _a968075310 _a969005155 |
||
020 |
_a9780128041963 _q(electronic bk.) |
||
020 |
_a012804196X _q(electronic bk.) |
||
020 | _a0128041803 | ||
020 | _a9780128041802 | ||
020 | _z9780128041802 | ||
035 |
_a(OCoLC)918135805 _z(OCoLC)919204868 _z(OCoLC)968075310 _z(OCoLC)969005155 |
||
050 | 4 |
_aHM742 _b.D35 2015eb |
|
072 | 7 |
_aPSY _x031000 _2bisacsh |
|
082 | 0 | 4 |
_a302.30285 _223 |
100 | 1 |
_aDalziel, Henry, _eauthor. |
|
245 | 1 | 0 |
_aSecuring social media in the enterprise / _h[electronic resource] _cHenry Dalziel ; contributing editor, Nicholas Arvanitis. |
264 | 1 |
_aWaltham, MA : _bElsevier : _bSyngress, _c2015 |
|
264 | 4 | _c�2015 | |
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _2rda |
||
588 | 0 | _aVendor-supplied metadata. | |
520 | _aSecuring Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise. Teaches how to: Use of social engineering techniques, Mimic threat behaviours, Categorize different classes of attacks (e.g., passive, active, insider, close-in, distribution, etc.), Quantify different operational threat environments, Categorize general attack stages. | ||
505 | 0 | _aThe typical approach -- Red team assessment -- Elements for success -- Who are weup against -- Things to keep in mind -- High risk of low risk -- Composite attacks. | |
650 | 0 | _aSocial media. | |
650 | 0 | _aComputer security. | |
650 | 7 |
_aPSYCHOLOGY _xSocial Psychology. _2bisacsh |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 |
|
650 | 7 |
_aSocial media. _2fast _0(OCoLC)fst01741098 |
|
650 | 7 |
_aIT-s�akerhet. _2sao |
|
650 | 7 |
_aSociala medier. _2sao |
|
655 | 4 | _aElectronic books. | |
655 | 7 |
_aElectronic books. _2lcgft |
|
776 | 0 | 8 |
_iPrint version: _aDalziel, Henry. _tSecuring social media in the enterprise. _dWaltham, MA : Elsevier : Syngress, [2015] _z9780128041963 _w(OCoLC)918135805 |
856 | 4 | 0 |
_3ScienceDirect _uhttp://www.sciencedirect.com/science/book/9780128041802 |
999 |
_c247133 _d247133 |