Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/informatique/securing-social-media-in-the-enterprise/descriptif_3777187
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=3777187

Securing Social Media in the Enterprise

Langue : Anglais

Auteur :

Couverture de l’ouvrage Securing Social Media in the Enterprise

Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise.

Chapter 1 - Introduction Chapter 2 - The Typical Approach Chapter 3 - Red Team Assessment Chapter 4 - Elements for Success Chapter 5 - Who Are We Up Against Chapter 6 - Things To Keep In Mind Chapter 7 - High Risk of Low Risk Chapter 8 - Composite Attacks Chapter 9 - Conclusion

Henry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger and e-book author. He writes for the Concise-Courses.com blog and has developed numerous cybersecurity continuing education courses and books. Concise Ac Ltd develops and distributes continuing education content [books and courses] for cybersecurity professionals seeking skill enhancement and career advancement. The company was recently accepted onto the UK Trade & Investment's (UKTI) Global Entrepreneur Programme (GEP).
  • Teaches how to: Use of social engineering techniques, Mimic threat behaviours, Categorize different classes of attacks (e.g., passive, active, insider, close-in, distribution, etc.), Quantify different operational threat environments, Categorize general attack stages

Date de parution :

Ouvrage de 48 p.

15.2x22.8 cm

Retiré de la vente