How to use Web 2.0 and social networking sites securely /
Given the widespread use of Web 2.0 technologies and their impact in terms of the number and types of incidents and the cost of them, controlling Web 2.0 risks needs to be a high priority for all organisations. This pocket guide provides recommendations for organisations that will help them ensure t...
Cote: | Libro Electrónico |
---|---|
Collectivité auteur: | IT Governance (Organization). Research Team |
Format: | Électronique eBook |
Langue: | Inglés |
Publié: |
Ely, U.K. :
IT Governance Pub.,
©2009.
|
Sujets: | |
Accès en ligne: | Texto completo (Requiere registro previo con correo institucional) |
Documents similaires
-
Threat 2.0 : security and compliance for Web 2.0 sites /
Publié: (2009) -
Security in a Web 2.0+ world : a standards based approach /
par: Solari, C. (Carlos)
Publié: (2009) -
Securing the borderless network : security for the web 2.0 world /
par: Gillis, Tom
Publié: (2010) -
¡Socorro, Quiero Ser Digital!
par: Feliciano, Alicia
Publié: (2010) -
Web 2.0 and social networking for the enterprise : guidelines and examples for implementation and management within your organization /
par: Bernal, Joey
Publié: (2010)