Securing social media in the enterprise
| Main Author: | Dalziel, Henry |
|---|---|
| Format: | Book |
| Published: |
Waltham, MA :
Elsevier Inc. ,
2015
|
| Subjects: |
Similar Items
E-commerce security : Weak links,best defenses
by: Ghosh, Anup K
Published: (1998)
by: Ghosh, Anup K
Published: (1998)
INSIDE JOBs : WHY INSIDER RISK IS THE BIGGEST CYBER THREAT YOU CAN'T IGNORE
by: Payne, Joe, et al.
Published: (2020)
by: Payne, Joe, et al.
Published: (2020)
Security Awareness for dummies
by: Winkler, Ira
Published: (2022)
by: Winkler, Ira
Published: (2022)
Cybersecurity program development for business : the essential planning guide
by: Moschovitis, Chris
Published: (2018)
by: Moschovitis, Chris
Published: (2018)
Securing E-Business applications and communications
by: Held, Jonathan S.
Published: (2001)
by: Held, Jonathan S.
Published: (2001)
Network security : a beginner's guide
by: Maiwald, Eric
Published: (2001)
by: Maiwald, Eric
Published: (2001)
Principles of information security
by: Whitman, Michael E.
Published: (2003)
by: Whitman, Michael E.
Published: (2003)
Computer security fundamentals
by: Easttom, Chuck
Published: (2012)
by: Easttom, Chuck
Published: (2012)
Network security bible
by: Cole, Eric
Published: (2009)
by: Cole, Eric
Published: (2009)
Elementary information security
by: Smith, Richard E.
Published: (2016)
by: Smith, Richard E.
Published: (2016)
Security risk management : building an information security risk management program from the ground up
by: Wheeler, Evan
Published: (2011)
by: Wheeler, Evan
Published: (2011)
Digital defense : what you should know about protecting your company's assets
by: Parenty, Thomas J.
Published: (2003)
by: Parenty, Thomas J.
Published: (2003)
Network security architectures
by: Convery, Sean
Published: (2004)
by: Convery, Sean
Published: (2004)
Securing the cloud : cloud comuter security techniques and tactics
by: Winkler, Vic (J.R.)
Published: (2011)
by: Winkler, Vic (J.R.)
Published: (2011)
24 deadly sins of software security : programming flaws and how to fix them
by: Howard, Michael 1965-
Published: (2010)
by: Howard, Michael 1965-
Published: (2010)
Fundamentals of information systems security
by: Kim, David
Published: (2012)
by: Kim, David
Published: (2012)
The complete guide to internet security
by: Merkow, Mark S
Published: (2000)
by: Merkow, Mark S
Published: (2000)
IT audit, control and security
by: Moeller, Robert
Published: (2010)
by: Moeller, Robert
Published: (2010)
Fundamentals of network security
by: Maiwald, Eric
Published: (2004)
by: Maiwald, Eric
Published: (2004)
New solutions for cybersecurity
Published: (2017)
Published: (2017)
Security in fixed and wireless networks : an introduction to securing data communications
by: Schafer, Gunter
Published: (2003)
by: Schafer, Gunter
Published: (2003)
The complete reference : Information security
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
E-policy : how to develop computer,E-mail and enternet guidelines to protect your company and its assets
by: Overly, Michael R.
Published: (1999)
by: Overly, Michael R.
Published: (1999)
Privacy and digital security
by: Fromm, Megan
Published: (2015)
by: Fromm, Megan
Published: (2015)
mCommerce security : A beginner's guide
by: Raina, Kapil
Published: (2002)
by: Raina, Kapil
Published: (2002)
CLOUD SECURITY : A GENERAL GUIDE TO SECURED COMPUTING
by: Masnida Hussin, et al.
Published: (2021)
by: Masnida Hussin, et al.
Published: (2021)
Hack attacks revealed : a complete reference with custom security haking toolkit
by: Chirillo, John
Published: (2001)
by: Chirillo, John
Published: (2001)
Auditing cloud computing : a security and privacy guide
Published: (2011)
Published: (2011)
Information security : contemporary cases
by: Wright, Marie A.
Published: (2006)
by: Wright, Marie A.
Published: (2006)
IT governance
by: Calder, Alan
Published: (2012)
by: Calder, Alan
Published: (2012)
Data-driven security
by: Jacobs, Jay
Published: (2014)
by: Jacobs, Jay
Published: (2014)
Exploiting online game : cheating massively distributed systems
by: Hoglund, Greg
Published: (2008)
by: Hoglund, Greg
Published: (2008)
Teknik wireless hacking dan cara pembendungannya
by: Efzy Zam
by: Efzy Zam
Hacking Multifactor Authentication
by: Grimes, Roger A.
Published: (2021)
by: Grimes, Roger A.
Published: (2021)
Cybersecurity for dummies
by: Steinberg, Joseph
Published: (2022)
by: Steinberg, Joseph
Published: (2022)
Is it safe? : protecting your computer,your business and yourself online
by: Miller, Michael
Published: (2008)
by: Miller, Michael
Published: (2008)
STEAM JOBS IN CYBER-SECURITY
by: Argentine, Cynthia
Published: (2020)
by: Argentine, Cynthia
Published: (2020)
SELinux by example : using security enhanced Linux
by: Mayer, Frank 1961-
Published: (2006)
by: Mayer, Frank 1961-
Published: (2006)
Guide to social media
by: Boniface, Susie
Published: (2018)
by: Boniface, Susie
Published: (2018)
Cyber security culture : counteracting cyber threats through organizational learning and training
by: Trim, Peter R.J
Published: (2013)
by: Trim, Peter R.J
Published: (2013)
Similar Items
-
E-commerce security : Weak links,best defenses
by: Ghosh, Anup K
Published: (1998) -
INSIDE JOBs : WHY INSIDER RISK IS THE BIGGEST CYBER THREAT YOU CAN'T IGNORE
by: Payne, Joe, et al.
Published: (2020) -
Security Awareness for dummies
by: Winkler, Ira
Published: (2022) -
Cybersecurity program development for business : the essential planning guide
by: Moschovitis, Chris
Published: (2018) -
Securing E-Business applications and communications
by: Held, Jonathan S.
Published: (2001)