Description |
1 online resource (1 volume) : illustrations |
Contents |
The social media security process -- Security strategy analysis : foundation of your security policy -- Monitoring in the social media landscape -- Threat assessment -- What can go wrong -- Social media security policy best practices -- Human resources : strategy & collaboration -- Utilization of resources : strategy & collaboration -- Monetary considerations : strategy & collaboration -- Operations management : strategy & collaboration -- Reputation management : strategy & collaboration -- Human resources monitoring & reporting -- Utilization monitoring & reporting -- Monetary monitoring & reporting -- Operations management monitoring & reporting -- Reputation management monitoring & reporting -- Assessing your social media strategy -- The future of social media security |
Summary |
Explaining the latest threats along with detailed fixes; best practices; and from the headlines case studies; this comprehensive guide will show you how to analyze risk; implement robust security protocols; and enforce social media usage policies. -- Edited summary from book |
Bibliography |
Includes bibliographical references and index |
Notes |
Online resource; title from title screen (Books24x7, viewed Mar. 14, 2012) |
Subject |
Computer networks -- Security measures.
|
|
Social media -- Security measures
|
|
Computer networks -- Security measures
|
Form |
Electronic book
|
Author |
Bahadur, Gary.
|
|
Inasi, Jason.
|
|
Carvalho, Alex de.
|
|
Powell, Juliette, 1976-
|
|
Valencia, Connie.
|
LC no. |
2011040257 |
ISBN |
9780071769068 |
|
0071769064 |
|
1280117567 |
|
9781280117565 |
|