Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Securing social media in the enterprise
~
Dalziel, Henry,
Linked to FindBook
Google Book
Amazon
博客來
Securing social media in the enterprise
Record Type:
Electronic resources : Monograph/item
Title/Author:
Securing social media in the enterprise/ Henry Dalziel ; contributing editor, Nicholas Arvanitis.
Author:
Dalziel, Henry,
Published:
Waltham, MA :Elsevier : : 2015.,
Description:
1 online resource.
[NT 15003449]:
The typical approach -- Red team assessment -- Elements for success -- Who are weup against -- Things to keep in mind -- High risk of low risk -- Composite attacks.
Subject:
Social media. -
Online resource:
https://www.sciencedirect.com/science/book/9780128041802
ISBN:
9780128041963 (electronic bk.)
Securing social media in the enterprise
Dalziel, Henry,
Securing social media in the enterprise
[electronic resource] /Henry Dalziel ; contributing editor, Nicholas Arvanitis. - Waltham, MA :Elsevier :2015. - 1 online resource.
The typical approach -- Red team assessment -- Elements for success -- Who are weup against -- Things to keep in mind -- High risk of low risk -- Composite attacks.
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise. Teaches how to: Use of social engineering techniques, Mimic threat behaviours, Categorize different classes of attacks (e.g., passive, active, insider, close-in, distribution, etc.), Quantify different operational threat environments, Categorize general attack stages.
ISBN: 9780128041963 (electronic bk.)Subjects--Topical Terms:
786190
Social media.
Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: HM742 / .D35 2015eb
Dewey Class. No.: 302.30285
Securing social media in the enterprise
LDR
:02041cmm a2200265 a 4500
001
2223373
006
o d
007
cnu|unuuu||
008
210114s2015 mau o 000 0 eng d
020
$a
9780128041963 (electronic bk.)
020
$a
012804196X (electronic bk.)
020
$a
9780128041802
020
$a
0128041803
035
$a
(OCoLC)918135805
035
$a
EL2020103
040
$a
N$T
$b
eng
$c
N$T
$d
EBLCP
$d
N$T
$d
YDXCP
$d
IDEBK
$d
UMI
$d
TEFOD
$d
UIU
$d
DEBSZ
$d
OCLCF
$d
CDX
$d
DEBBG
$d
D6H
$d
FEM
$d
OCLCQ
$d
MERUC
$d
COO
$d
OCLCQ
$d
OCLCA
$d
REB
$d
WRM
$d
U3W
$d
CEF
$d
OCLCQ
$d
CUY
$d
LOA
$d
ZCU
$d
G3B
$d
CNCEN
$d
S8J
041
0
$a
eng
050
4
$a
HM742
$b
.D35 2015eb
082
0 4
$a
302.30285
$2
23
100
1
$a
Dalziel, Henry,
$e
author.
$3
3462750
245
1 0
$a
Securing social media in the enterprise
$h
[electronic resource] /
$c
Henry Dalziel ; contributing editor, Nicholas Arvanitis.
260
$a
Waltham, MA :
$b
Elsevier :
$b
Syngress,
$c
2015.
300
$a
1 online resource.
505
0
$a
The typical approach -- Red team assessment -- Elements for success -- Who are weup against -- Things to keep in mind -- High risk of low risk -- Composite attacks.
520
$a
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise. Teaches how to: Use of social engineering techniques, Mimic threat behaviours, Categorize different classes of attacks (e.g., passive, active, insider, close-in, distribution, etc.), Quantify different operational threat environments, Categorize general attack stages.
588
0
$a
Vendor-supplied metadata.
650
0
$a
Social media.
$3
786190
650
0
$a
Computer security.
$3
540555
655
4
$a
Electronic books.
$2
lcsh
$3
542853
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128041802
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9395904
電子資源
11.線上閱覽_V
電子書
EB HM742 .D35 2015eb
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login