did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780071769051

Securing the Clicks Network Security in the Age of Social Media

by ; ;
  • ISBN13:

    9780071769051

  • ISBN10:

    0071769056

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2011-10-31
  • Publisher: McGraw-Hill Education

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $40.00 Save up to $14.00
  • Rent Book $26.00
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 24-48 HOURS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

Proven methods for securing corporate networks against social media attacks Securing the Clicks: Network Security in the Age of Social Mediaprovides you with knowledge and actions you can put to use immediately to harden corporate networks against social media attacks now. The #1 vehicle for hackers today is social media. Part I of this book details effective methods for analyzing the organization from multiple perspectives and includes compelling, illustrative, real-world case examples. Part II digs into the types of threats social media brings and how you can predict and defend against various types of risks. Part III outlines best practices for developing the plans, policies, and processes that are the backbone of reducing risk to organizations' networks. Part IV provides methods for maintaining, monitoring, and managing these plans on an ongoing basis for maximum results and long-term security. Securing the Clicks: Network Security in the Age of Social Media Outlines proven methodologies for developing and implementing protection plans to best secure the use of social media Emphasizes organizational collaboration across key departments, including IT, HR, and marketing/PR Provides essential information about notable social media attacks, their outcomes, and lessons learnedwith recommended best practices Includes examples from Europe, Asia, South America, and the U.S. Covers key third-party software and services for protecting against social media-generated network attacks

Table of Contents

Part I: Assessing Social Media Security
Chapter 1. The Social Media Security Process
Chapter 2. Security Strategy Analysis: Foundation of Your Security Policy
Chapter 3. Monitoring in the Social Media Landscape
Part II: Assessing Social Media Threats
Chapter 4. Threat Assessment
Chapter 5. What Can Go Wrong
Part III: Operations, Policies, & Processes
Chapter 6. Social Media Security Policy Best Practices
Chapter 7. Human Resources: Strategy & Collaboration
Chapter 8. Utilization of Resources: Strategy & Collaboration
Chapter 9. Monetary Considerations: Strategy & Collaboration
Chapter 10. Operations Management: Strategy & Collaboration
Chapter 11. Reputation Management: Strategy & Collaboration
Part IV: Monitoring & Reporting
Chapter 12. Human Resources Monitoring & Reporting
Chapter 13. Utilization Monitoring & Reporting
Chapter 14. Monetary Monitoring & Reporting
Chapter 15. Operations Management Monitoring & Reporting
Chapter 16. Reputation Management Monitoring & Reporting
Part V: Social Media 3.0
Chapter 17. Assessing Your Social Media Strategy
Chapter 18. The Future of Social Media Security
Appendix: Resource Guide
Index

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program