MASSIVE SAVINGS JUST FOR YOU!
VIEW DEALS

Securing The Clicks



This book is about ways to secure corporate networks against social media attacks. It provides knowledge and actions that can be put into use immediately to harden networks against attacks. The book covers different aspects of social media, such as analyzing the organization from multiple perspectives, understanding the types of risks social media brings, and developing plans and policies to reduc... more details
Key Features:
  • Provides knowledge and actions that can be put into use immediately to harden networks against attacks
  • Covers different aspects of social media, such as analyzing the organization from multiple perspectives, understanding the types of risks social media brings, and developing plans and policies to reduce risk
  • Also covers how to maintain, monitor, and manage these plans on an ongoing basis


R835.00 from Loot.co.za

price history Price history

   BP = Best Price   HP = Highest Price

Current Price: R835.00

loading...

 Comparing 1 offers


tagged products icon   Similarly Tagged Products

Description
This book is about ways to secure corporate networks against social media attacks. It provides knowledge and actions that can be put into use immediately to harden networks against attacks. The book covers different aspects of social media, such as analyzing the organization from multiple perspectives, understanding the types of risks social media brings, and developing plans and policies to reduce risk. The book also covers how to maintain, monitor, and manage these plans on an ongoing basis.

Proven methods for securing corporate networks against social media attacks Securing the Clicks: Network Security in the Age of Social Media provides you with knowledge and actions you can put to use immediately to harden corporate networks against social media attacks now. The #1 vehicle for hackers today is social media. Part I of this book details effective methods for analyzing the organization from multiple perspectives and includes compelling, illustrative, real-world case examples. Part II digs into the types of threats social media brings and how you can predict and defend against various types of risks. Part III outlines best practices for developing the plans, policies, and processes that are the backbone of reducing risk to organizations' networks. Part IV provides methods for maintaining, monitoring, and managing these plans on an ongoing basis for maximum results and long-term security. Securing the Clicks: Network Security in the Age of Social Media Outlines proven methodologies for developing and implementing protection plans to best secure the use of social media Emphasizes organizational collaboration across key departments, including IT, HR, and marketing/PR Provides essential information about notable social media attacks, their outcomes, and lessons learned--with recommended best practices Includes examples from Europe, Asia, South America, and the U.S. Covers key third-party software and services for protecting against social media-generated network attacks
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.