Social media security : leveraging social networking while mitigating risk /
Saved in:
Main Author: | Cross, Michael, 1965- |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Amsterdam, [Netherlands] ; Boston :
Syngress,
[2013]
|
Subjects: | |
Online Access: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Using social media for global security
by: Gupta, Ravi
Published: (2013)
by: Gupta, Ravi
Published: (2013)
Public interest and private rights in social media /
Published: (2012)
Published: (2012)
Social networking in recruitment : build your social networking expertise to give yourself a cost-effective advantage in the hiring market /
by: Belton, Amanda
Published: (2014)
by: Belton, Amanda
Published: (2014)
Developer's guide to web application security
by: Cross, Michael
Published: (2007)
by: Cross, Michael
Published: (2007)
Social media curation /
by: Valenza, Joyce Kasman, et al.
Published: (2014)
by: Valenza, Joyce Kasman, et al.
Published: (2014)
Social media, sociality, and survey research /
Published: (2014)
Published: (2014)
Social media and the good life : do they connect? /
by: Herring, Mark Y., 1952-
Published: (2015)
by: Herring, Mark Y., 1952-
Published: (2015)
Developing a social network analysis and visualization module for repast models
by: Holzhauer, Sascha
Published: (2010)
by: Holzhauer, Sascha
Published: (2010)
Designing network security : a practical guide to creating a secure network infrastructure /
by: Kaeo, Merike
Published: (2004)
by: Kaeo, Merike
Published: (2004)
OpenSocial network programming
by: Grewe, Lynne, 1965-
Published: (2009)
by: Grewe, Lynne, 1965-
Published: (2009)
Social media usage and impact /
Published: (2012)
Published: (2012)
Social media metrics secrets do what you never thought possible with social media metrics /
by: Lovett, John
Published: (2011)
by: Lovett, John
Published: (2011)
Aspects of network and information security
Published: (2008)
Published: (2008)
Network security /
by: Perez, Andre
Published: (2014)
by: Perez, Andre
Published: (2014)
The culture of connectivity a critical history of social media /
by: Dijck, Jose van
Published: (2013)
by: Dijck, Jose van
Published: (2013)
Mastering network security
by: Brenton, Chris
Published: (2003)
by: Brenton, Chris
Published: (2003)
Network security foundations
by: Strebe, Matthew
Published: (2004)
by: Strebe, Matthew
Published: (2004)
Network and security issues for internet mobile entertainment
Published: (2004)
Published: (2004)
Security in ad hoc and sensor networks
by: Beyah, Raheem (Raheem A.), 1976-
Published: (2010)
by: Beyah, Raheem (Raheem A.), 1976-
Published: (2010)
Web commerce security design and development /
by: Nahari, Hadi
Published: (2011)
by: Nahari, Hadi
Published: (2011)
Target audience perceptions of the effectiveness of social media as a behaviour change communication channel : a study of nakufeel's Facebook campaign in Kenya /
by: Mwangi, Nancy Njoki
Published: (2016)
by: Mwangi, Nancy Njoki
Published: (2016)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
by: Mularien, Peter
Published: (2010)
by: Mularien, Peter
Published: (2010)
Cyber security /
Published: (2014)
Published: (2014)
Advances in cyber security : technology, operations, and experiences /
Published: (2013)
Published: (2013)
Security convergence managing enterprise security risk /
by: Tyson, Dave
Published: (2007)
by: Tyson, Dave
Published: (2007)
Security risk management building an information security risk management program from the ground up /
by: Wheeler, Evan
Published: (2011)
by: Wheeler, Evan
Published: (2011)
IoT security issues /
by: Gilchrist, Alasdair
Published: (2017)
by: Gilchrist, Alasdair
Published: (2017)
Network security evaluation using the NSA IEM /
by: Fuller, Ed
Published: (2005)
by: Fuller, Ed
Published: (2005)
Internet security and firewalls
by: Preetham, V. V.
Published: (2002)
by: Preetham, V. V.
Published: (2002)
Managing information security
Published: (2010)
Published: (2010)
Security sage's guide to hardening the network infrastructure
by: Andrés, Steven
Published: (2004)
by: Andrés, Steven
Published: (2004)
Cyber security and resiliency policy framework /
Published: (2014)
Published: (2014)
Security architect : careers in information security /
by: Collins, Jon
Published: (2014)
by: Collins, Jon
Published: (2014)
How to cheat at managing information security
by: Osborne, Mark
Published: (2006)
by: Osborne, Mark
Published: (2006)
Internet security you can afford : using untangle as your internet gateway /
by: Dawson, Christopher
Published: (2015)
by: Dawson, Christopher
Published: (2015)
Network security jumpstart
by: Strebe, Matthew
Published: (2002)
by: Strebe, Matthew
Published: (2002)
Similar Items
-
Using social media for global security
by: Gupta, Ravi
Published: (2013) -
Public interest and private rights in social media /
Published: (2012) -
Social networking in recruitment : build your social networking expertise to give yourself a cost-effective advantage in the hiring market /
by: Belton, Amanda
Published: (2014) -
Developer's guide to web application security
by: Cross, Michael
Published: (2007) -
Social media curation /
by: Valenza, Joyce Kasman, et al.
Published: (2014)