Securing the clicks network security in the age of social media

Explaining the latest threats along with detailed fixes; best practices; and from the headlines case studies; this comprehensive guide will show you how to analyze risk; implement robust security protocols; and enforce social media usage policies. --

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Inasi, Jason (VerfasserIn), Carvalho, Alex de (VerfasserIn)
Weitere Verfasser: Bahadur, Gary (MitwirkendeR), Powell, Juliette 1976- (HerausgeberIn), Valencia, Connie (HerausgeberIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: New York McGraw-Hill 2012
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-047391111
003 DE-627-1
005 20240228114917.0
007 cr uuu---uuuuu
008 191023s2012 xx |||||o 00| ||eng c
020 |a 9780071769068  |c electronic bk.  |9 978-0-07-176906-8 
020 |a 0071769064  |c electronic bk.  |9 0-07-176906-4 
020 |a 1280117567  |9 1-280-11756-7 
020 |a 9781280117565  |9 978-1-280-11756-5 
020 |a 9780071769051  |9 978-0-07-176905-1 
035 |a (DE-627-1)047391111 
035 |a (DE-599)KEP047391111 
035 |a (ORHE)9780071769051 
035 |a (DE-627-1)047391111 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8  |2 23 
245 1 0 |a Securing the clicks  |b network security in the age of social media  |c Gary Bahadur, Jason Inasi, Alex de Carvalho ; technical editors, Juliette Powell, Connie Valencia 
246 3 3 |a Network security in the age of social media 
264 1 |a New York  |b McGraw-Hill  |c 2012 
300 |a 1 online resource (1 volume)  |b illustrations 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Includes bibliographical references and index. - Online resource; title from title screen (Books24x7, viewed Mar. 14, 2012) 
520 |a Explaining the latest threats along with detailed fixes; best practices; and from the headlines case studies; this comprehensive guide will show you how to analyze risk; implement robust security protocols; and enforce social media usage policies. -- 
650 0 |a Computer networks  |x Security measures 
650 0 |a Social media  |x Security measures 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a Médias sociaux ; Sécurité ; Mesures 
650 4 |a Computer networks ; Security measures 
700 1 |a Bahadur, Gary  |e MitwirkendeR  |4 ctb 
700 1 |a Inasi, Jason  |e VerfasserIn  |4 aut 
700 1 |a Carvalho, Alex de  |e VerfasserIn  |4 aut 
700 1 |a Powell, Juliette  |d 1976-  |e HerausgeberIn  |4 edt 
700 1 |a Valencia, Connie  |e HerausgeberIn  |4 edt 
776 1 |z 9780071769051 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9780071769051 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9780071769051/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047391111
_version_ 1818767351337713664
adam_text
any_adam_object
author Inasi, Jason
Carvalho, Alex de
author2 Bahadur, Gary
Powell, Juliette 1976-
Valencia, Connie
author2_role ctb
edt
edt
author2_variant g b gb
j p jp
c v cv
author_facet Inasi, Jason
Carvalho, Alex de
Bahadur, Gary
Powell, Juliette 1976-
Valencia, Connie
author_role aut
aut
author_sort Inasi, Jason
author_variant j i ji
a d c ad adc
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047391111
(DE-599)KEP047391111
(ORHE)9780071769051
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02377cam a22005292 4500</leader><controlfield tag="001">ZDB-30-ORH-047391111</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114917.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2012 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780071769068</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-07-176906-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0071769064</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-07-176906-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1280117567</subfield><subfield code="9">1-280-11756-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781280117565</subfield><subfield code="9">978-1-280-11756-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780071769051</subfield><subfield code="9">978-0-07-176905-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047391111</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047391111</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780071769051</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047391111</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing the clicks</subfield><subfield code="b">network security in the age of social media</subfield><subfield code="c">Gary Bahadur, Jason Inasi, Alex de Carvalho ; technical editors, Juliette Powell, Connie Valencia</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Network security in the age of social media</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">McGraw-Hill</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from title screen (Books24x7, viewed Mar. 14, 2012)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Explaining the latest threats along with detailed fixes; best practices; and from the headlines case studies; this comprehensive guide will show you how to analyze risk; implement robust security protocols; and enforce social media usage policies. --</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Social media</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Médias sociaux ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bahadur, Gary</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Inasi, Jason</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Carvalho, Alex de</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Powell, Juliette</subfield><subfield code="d">1976-</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Valencia, Connie</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780071769051</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780071769051</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780071769051/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047391111
illustrated Illustrated
indexdate 2024-12-18T08:48:30Z
institution BVB
isbn 9780071769068
0071769064
1280117567
9781280117565
9780071769051
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (1 volume) illustrations
psigel ZDB-30-ORH
publishDate 2012
publishDateSearch 2012
publishDateSort 2012
publisher McGraw-Hill
record_format marc
spelling Securing the clicks network security in the age of social media Gary Bahadur, Jason Inasi, Alex de Carvalho ; technical editors, Juliette Powell, Connie Valencia
Network security in the age of social media
New York McGraw-Hill 2012
1 online resource (1 volume) illustrations
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Includes bibliographical references and index. - Online resource; title from title screen (Books24x7, viewed Mar. 14, 2012)
Explaining the latest threats along with detailed fixes; best practices; and from the headlines case studies; this comprehensive guide will show you how to analyze risk; implement robust security protocols; and enforce social media usage policies. --
Computer networks Security measures
Social media Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Médias sociaux ; Sécurité ; Mesures
Computer networks ; Security measures
Bahadur, Gary MitwirkendeR ctb
Inasi, Jason VerfasserIn aut
Carvalho, Alex de VerfasserIn aut
Powell, Juliette 1976- HerausgeberIn edt
Valencia, Connie HerausgeberIn edt
9780071769051
Erscheint auch als Druck-Ausgabe 9780071769051
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9780071769051/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Inasi, Jason
Carvalho, Alex de
Securing the clicks network security in the age of social media
Computer networks Security measures
Social media Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Médias sociaux ; Sécurité ; Mesures
Computer networks ; Security measures
title Securing the clicks network security in the age of social media
title_alt Network security in the age of social media
title_auth Securing the clicks network security in the age of social media
title_exact_search Securing the clicks network security in the age of social media
title_full Securing the clicks network security in the age of social media Gary Bahadur, Jason Inasi, Alex de Carvalho ; technical editors, Juliette Powell, Connie Valencia
title_fullStr Securing the clicks network security in the age of social media Gary Bahadur, Jason Inasi, Alex de Carvalho ; technical editors, Juliette Powell, Connie Valencia
title_full_unstemmed Securing the clicks network security in the age of social media Gary Bahadur, Jason Inasi, Alex de Carvalho ; technical editors, Juliette Powell, Connie Valencia
title_short Securing the clicks
title_sort securing the clicks network security in the age of social media
title_sub network security in the age of social media
topic Computer networks Security measures
Social media Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Médias sociaux ; Sécurité ; Mesures
Computer networks ; Security measures
topic_facet Computer networks Security measures
Social media Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Médias sociaux ; Sécurité ; Mesures
Computer networks ; Security measures
url https://learning.oreilly.com/library/view/-/9780071769051/?ar
work_keys_str_mv AT bahadurgary securingtheclicksnetworksecurityintheageofsocialmedia
AT inasijason securingtheclicksnetworksecurityintheageofsocialmedia
AT carvalhoalexde securingtheclicksnetworksecurityintheageofsocialmedia
AT powelljuliette securingtheclicksnetworksecurityintheageofsocialmedia
AT valenciaconnie securingtheclicksnetworksecurityintheageofsocialmedia
AT bahadurgary networksecurityintheageofsocialmedia
AT inasijason networksecurityintheageofsocialmedia
AT carvalhoalexde networksecurityintheageofsocialmedia
AT powelljuliette networksecurityintheageofsocialmedia
AT valenciaconnie networksecurityintheageofsocialmedia