Securing Social Media in the Enterprise - 1st Edition - ISBN: 9780128041802, 9780128041963

Securing Social Media in the Enterprise

1st Edition

Authors: Henry Dalziel
eBook ISBN: 9780128041963
Paperback ISBN: 9780128041802
Imprint: Syngress
Published Date: 19th August 2015
Page Count: 48
Tax/VAT will be calculated at check-out Price includes VAT (GST)
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
39.95
27.96
27.96
27.96
27.96
27.96
31.96
31.96
24.99
17.49
17.49
17.49
17.49
17.49
19.99
19.99
28.95
20.27
20.27
20.27
20.27
20.27
23.16
23.16
42.68
29.88
29.88
29.88
29.88
29.88
34.14
34.14
Unavailable
Price includes VAT (GST)
× DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.

Description

Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise.

Key Features

  • Teaches how to: Use of social engineering techniques, Mimic threat behaviours, Categorize different classes of attacks (e.g., passive, active, insider, close-in, distribution, etc.), Quantify different operational threat environments, Categorize general attack stages

Readership

security professionals and network systems administrators

Table of Contents

  • Author Biography
  • Contributing Editor Biography
  • Chapter 1. Introduction
  • Chapter 2. ISO Security Management Categories
  • Chapter 3. Risk Management
  • Chapter 4. Policy Management
  • Chapter 5. Security Organization Management
  • Chapter 6. Human Resources Security Management
  • Chapter 7. Asset Management
  • Chapter 8. Access Management
  • Chapter 9. Cryptography
  • Chapter 10. Physical and Environmental Security Management
  • Chapter 11. Security Operations Management
  • Chapter 12. Communications Security Management
  • Chapter 13. Systems Acquisition, Development, and Maintenance
  • Chapter 14. Supplier Security Management
  • Chapter 15. Information Security Incident Management
  • Chapter 16. Business Continuity Management
  • Chapter 17. Compliance Management
  • Chapter 18. Skillset Groupings
  • Chapter 19. Resources
  • Chapter 20. Conclusion

Details

No. of pages:
48
Language:
English
Copyright:
© Syngress 2015
Published:
Imprint:
Syngress
eBook ISBN:
9780128041963
Paperback ISBN:
9780128041802

About the Author

Henry Dalziel

Henry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger and e-book author. He writes for the Concise-Courses.com blog and has developed numerous cybersecurity continuing education courses and books. Concise Ac Ltd develops and distributes continuing education content [books and courses] for cybersecurity professionals seeking skill enhancement and career advancement. The company was recently accepted onto the UK Trade & Investment's (UKTI) Global Entrepreneur Programme (GEP).

Affiliations and Expertise

Founder, Concise Ac Ltd, UK

Reviews

"...demonstrates just how much information can be gleaned by an attacker through the use of real-life examples,…The solution lies in awareness, and this book could provide a blueprint for an effective education campaign." --Network Security