Securing Social Media in the Enterprise

Securing Social Media in the Enterprise

by Henry Dalziel
ISBN-10:
0128041803
ISBN-13:
9780128041802
Pub. Date:
09/02/2015
Publisher:
Elsevier Science
ISBN-10:
0128041803
ISBN-13:
9780128041802
Pub. Date:
09/02/2015
Publisher:
Elsevier Science
Securing Social Media in the Enterprise

Securing Social Media in the Enterprise

by Henry Dalziel
$39.95 Current price is , Original price is $39.95. You
$39.95 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise.

  • Teaches how to: Use of social engineering techniques, Mimic threat behaviours, Categorize different classes of attacks (e.g., passive, active, insider, close-in, distribution, etc.), Quantify different operational threat environments, Categorize general attack stages

Product Details

ISBN-13: 9780128041802
Publisher: Elsevier Science
Publication date: 09/02/2015
Pages: 48
Product dimensions: 5.80(w) x 8.90(h) x 0.40(d)

About the Author

Henry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger and e-book author. He writes for the Concise-Courses.com blog and has developed numerous cybersecurity continuing education courses and books. Concise Ac Ltd develops and distributes continuing education content [books and courses] for cybersecurity professionals seeking skill enhancement and career advancement. The company was recently accepted onto the UK Trade & Investment's (UKTI) Global Entrepreneur Programme (GEP).

Table of Contents

Chapter 1 - Introduction Chapter 2 - The Typical Approach Chapter 3 - Red Team Assessment Chapter 4 - Elements for Success Chapter 5 - Who Are We Up Against Chapter 6 - Things To Keep In Mind Chapter 7 - High Risk of Low Risk Chapter 8 - Composite Attacks Chapter 9 - Conclusion

From the B&N Reads Blog

Customer Reviews