|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
SCIDIR_ocn918135805 |
003 |
OCoLC |
005 |
20231120112014.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
150813s2015 mau o 000 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d EBLCP
|d N$T
|d YDXCP
|d IDEBK
|d UMI
|d TEFOD
|d UIU
|d DEBSZ
|d OCLCF
|d CDX
|d DEBBG
|d D6H
|d FEM
|d OCLCQ
|d MERUC
|d COO
|d OCLCQ
|d OCLCA
|d REB
|d WRM
|d U3W
|d CEF
|d OCLCQ
|d CUY
|d LOA
|d ZCU
|d G3B
|d CNCEN
|d S8J
|d ICG
|d K6U
|d COCUF
|d CNNOR
|d DKC
|d AU@
|d OCLCQ
|d LQU
|d DCT
|d OCLCQ
|d MM9
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 919204868
|a 968075310
|a 969005155
|a 1105173569
|a 1105561038
|
020 |
|
|
|a 9780128041963
|q (electronic bk.)
|
020 |
|
|
|a 012804196X
|q (electronic bk.)
|
020 |
|
|
|a 0128041803
|
020 |
|
|
|a 9780128041802
|
020 |
|
|
|z 9780128041802
|
035 |
|
|
|a (OCoLC)918135805
|z (OCoLC)919204868
|z (OCoLC)968075310
|z (OCoLC)969005155
|z (OCoLC)1105173569
|z (OCoLC)1105561038
|
050 |
|
4 |
|a HM742
|b .D35 2015eb
|
072 |
|
7 |
|a PSY
|x 031000
|2 bisacsh
|
082 |
0 |
4 |
|a 302.30285
|2 23
|
100 |
1 |
|
|a Dalziel, Henry,
|e author.
|
245 |
1 |
0 |
|a Securing social media in the enterprise /
|c Henry Dalziel ; contributing editor, Nicholas Arvanitis.
|
264 |
|
1 |
|a Waltham, MA :
|b Elsevier :
|b Syngress,
|c [2015]
|
264 |
|
4 |
|c �2015
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
588 |
0 |
|
|a Vendor-supplied metadata.
|
520 |
|
|
|a Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise. Teaches how to: Use of social engineering techniques, Mimic threat behaviours, Categorize different classes of attacks (e.g., passive, active, insider, close-in, distribution, etc.), Quantify different operational threat environments, Categorize general attack stages.
|
505 |
0 |
|
|a The typical approach -- Red team assessment -- Elements for success -- Who are weup against -- Things to keep in mind -- High risk of low risk -- Composite attacks.
|
650 |
|
0 |
|a Social media.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Social Media
|0 (DNLM)D061108
|
650 |
|
2 |
|a Computer Security
|0 (DNLM)D016494
|
650 |
|
6 |
|a M�edias sociaux.
|0 (CaQQLa)000258927
|
650 |
|
6 |
|a S�ecurit�e informatique.
|0 (CaQQLa)201-0061152
|
650 |
|
7 |
|a social media.
|2 aat
|0 (CStmoGRI)aat300312269
|
650 |
|
7 |
|a PSYCHOLOGY
|x Social Psychology.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Social media
|2 fast
|0 (OCoLC)fst01741098
|
650 |
|
7 |
|a IT-s�akerhet.
|2 sao
|
650 |
|
7 |
|a Sociala medier.
|2 sao
|
776 |
0 |
8 |
|i Print version:
|a Dalziel, Henry.
|t Securing social media in the enterprise.
|d Waltham, MA : Elsevier : Syngress, [2015]
|z 9780128041963
|w (OCoLC)918135805
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780128041802
|z Texto completo
|