|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn893676506 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
141008t20152015enka ob 001 0 eng d |
040 |
|
|
|a E7B
|b eng
|e rda
|e pn
|c E7B
|d OCLCO
|d UMI
|d DEBBG
|d DEBSZ
|d OCLCF
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d AU@
|d VT2
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 897388038
|a 1153051014
|
020 |
|
|
|a 9780124200609
|q (e-book)
|
020 |
|
|
|a 0124200605
|q (e-book)
|
020 |
|
|
|a 0124200559
|
020 |
|
|
|a 9780124200555
|
020 |
|
|
|z 9780124200555
|
029 |
1 |
|
|a DEBBG
|b BV042490332
|
029 |
1 |
|
|a DEBSZ
|b 434835110
|
029 |
1 |
|
|a GBVCP
|b 88284282X
|
035 |
|
|
|a (OCoLC)893676506
|z (OCoLC)897388038
|z (OCoLC)1153051014
|
037 |
|
|
|a CL0500000509
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|b .G67 2015eb
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Gonzalez, Deborah,
|e author.
|
245 |
1 |
0 |
|a Managing online risk :
|b apps, mobile, and social media security /
|c Deborah Gonzalez ; designer, Alan Studholme.
|
264 |
|
1 |
|a Kidlington, England ;
|a Waltham, Massachusetts :
|b Butterworth-Heinemann,
|c 2015.
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource (287 pages) :
|b illustrations, tables
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Front Cover; Managing Online Risk; Copyright; Contents; About the Author; Online Resources; Introduction; CHAPTER 1 -- RISK MANAGEMENT DIGITAL STYLE; RISK MANAGEMENT MODELS; BEST PRACTICES FOR INCIDENT RESPONSE; BONUS: TEN IT SECURITY MYTHS; SECURITY/RISK MANAGEMENT APPS; CHAPTER 2 -- INTERNAL AND EXTERNAL RISKS; INTERNAL RISKS; INTERNAL RISK 1: SECURITY PERCEPTION, PRIORITY, AND BUDGET; INTERNAL RISK 2: TRADITIONAL AND SHADOW IT; INTERNAL RISK 3: MOBILE; INTERNAL RISK 4: PEOPLE; EXTERNAL RISKS; EXTERNAL RISK 1: TECHNOLOGY ADVANCES; EXTERNAL RISK 2: CLOUD STORAGE; EXTERNAL RISK 3: HACKING.
|
505 |
8 |
|
|a EXTERNAL RISK 4: REGULATIONEXTERNAL RISK 5: NATURAL DISASTERS AND SQUIRRELS; CHAPTER 3 -- REPUTATION AND IDENTITY; REPUTATION; REPUTATIONAL RISKS; DEFINING IDENTITY; DIGITAL IDENTITY; LEGAL IDENTITY; EXECUTIVE IDENTITY; CORPORATE IDENTITY: THE BRAND; VALUE AND WORTH OF IDENTITY; IDENTITY VERSUS REPUTATION; PROTECTING IDENTITY; PROTECTING REPUTATION; CHAPTER 4 -- THE NEW WORKFORCE; EMPLOYMENT CYCLE; WHO IS THE WORKFORCE?; MILLENNIALS; RECRUITMENT; HIRING; EMPLOYMENT; TERMINATION; OTHER; CHAPTER 5 -- BIG DATA; DATA CYCLE; DATA MANAGEMENT PLANS; DATA CLASSIFICATION; DATA ACCESS; DATA ANALYTICS.
|
505 |
8 |
|
|a PROTECTING DATA: BACKUPLOSING DATA; DATA RECOVERY; PRIVACY: TO USE OR NOT TO USE DATA DILEMMA; PROTECTING AGAINST LIABILITY FOR DATA/PRIVACY LOSS; DATA SURVEILLANCE; DICTATORSHIP OF DATA; CHAPTER 6 -- APPROACHES TO CONTENT; CONTENT MARKETING VERSUS CONTENT MANAGEMENT; DIFFERENT AUDIENCES, DIFFERENT CONTENT; MYTHS OF CONTENT MARKETING AND CONTENT MANAGEMENT; BENEFITS OF THE CONTENT APPROACH; INTELLECTUAL PROPERTY RIGHTS, RISKS, AND CONTENT; IP CYCLE; COPYRIGHTS; DIGITAL MILLENNIUM COPYRIGHT ACT; FAIR USE DOCTRINE; INTERNATIONAL IP CONCERNS; CREATIVE COMMONS LICENSE.
|
505 |
8 |
|
|a A COUPLE OF DIGITAL CONCERNS FOR COPYRIGHTSTRADEMARKS; TRADEMARK AND GRIPE SITES; TRADEMARK AND REPUTATIONAL RISKS; TRADE SECRETS; PATENTS; TECHNOLOGY DEVELOPMENT; IP OTHER RISKS; IP VALUATION; IP LEGISLATION; CHAPTER 7 -- COMPLIANCE; WHO NEEDS TO BE COMPLIANT?; GENERAL COMPLIANCE: DISCLOSURES; GENERAL COMPLIANCE: DISCLAIMERS; GENERAL COMPLIANCE: HUMAN RESOURCES; FINANCIAL INSTITUTIONS; HEALTH CARE AND MEDICAL INSTITUTIONS; HIGHER EDUCATION (FERPA); PROFESSIONAL TRADE OVERSIGHT AND ORGANIZATIONS: MOBILE; OTHER FEDERAL AGENCIES; FEDERAL LEGISLATION; STATE LEGISLATION; COMPLIANCE OVERSIGHT.
|
505 |
8 |
|
|a COMPLIANCE TRAININGCHAPTER 8 -- CURRENCY AND CAMPAIGNS; ONLINE BANKING; E-PAYMENTS CONVERT TO M-PAYMENTS; VIRTUAL CURRENCY; DIGITAL CURRENCY; BITCOIN; BEYOND BITCOINS; CROWDFUNDING; ONLINE MICROFINANCING; ONLINE CHARITABLE DONATIONS AND FUNDRAISING; FUTURE OF MONEY; DIGITAL POLITICAL CAMPAIGNS; DIGITAL ADVOCACY; DIGITAL LOBBYING; RISK AND SECURITY OF ONLINE POLITICS; CHAPTER 9 -- DIGITAL SUCCESSION; SUCCESSION PLANNING; INFORMATION TECHNOLOGY SECURITY SHORTAGE; THE NEXT GENERATION OF INFOSEC PRO; WOMEN IN INFOSEC; CYBERSECURITY SIMULATIONS; DIGITAL LEGACY; DIGITAL ASSETS; DIGITAL AFTERLIFE.
|
520 |
|
|
|a In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online Risk presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses. Managing Online Risk highlights security and risk management best practices that address concerns such as data collection and stora.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Internet
|x Security measures
|2 fast
|
700 |
1 |
|
|a Studholme, Alan,
|e designer.
|
776 |
0 |
8 |
|i Print version:
|a Gonzalez, Deborah.
|t Managing online risk : apps, mobile, and social media security.
|d Kidlington, England ; Waltham, Massachusetts : Butterworth-Heinemann, ©2015
|h xiii, 271 pages
|z 9780124200555
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780124200555/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10944052
|
994 |
|
|
|a 92
|b IZTAP
|