Contents. Assessing Social Media Security. Chapter! The Social Media Security Process 3
|
|
- Elvin Kelley
- 8 years ago
- Views:
Transcription
1 Securing the Clicks: Network Security in the Age of Social Media Gary Bahadur Jason I nasi Alex de Carvalho Mc ssr New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto
2 Contents Foreword Introduction xix xxi Part I Assessing Social Media Security Chapter! The Social Media Security Process 3 Case Study: Reputation Damage from an Unprepared Social Media Strategy 4 What Went Wrong? 5 How Security Has Changed in the Recent Past 6 The Assessment Process 7 Why Follow the Assessment Process? 8 Organizational Analysis: Your Industry Online, the Good and the Bad 9 Analyzing Your Social Media Initiatives 10 Analyzing Your Existing Internal Processes 11 Securing Customer Data 11 Securing Channels of Communication 12 Identifying the Current Gaps in How Your Company Utilizes Social Media Securely Competitive Analysis 13 Wrap Up 15 Chapter 2 Security Strategy Analysis: Foundation of Your Security Policy 17 Case Study: Hacking Is an Equal Opportunity Sport 18 The H.U.M.O.R. Matrix 19 Human Resources 21 Assessing the Current Environment 21 Measuring the Current State: H.U.M.O.R. Matrix 26 Utilization of Resources and Assets 27 Assessing the Current Environment 28 Measuring the Current State: H.U.M.O.R. Matrix 32
3 xii Securing the Clicks: Network Security in the Age of Social Media Monetary Considerations 34 Assessing the Current Environment 34 Measuring the Current State: H.U.M.O.R. Matrix 35 Operations Management 36 Assessing the Current Environment 37 Measuring the Current State: H.U.M.O.R. Matrix 40 Reputation Management 41 Assessing the Current Environment 41 Measuring the Current State: H.U.M.O.R. Matrix 44 Wrap Up 45 Chapter 3 Monitoring in the Social Media Landscape 47 Case Study: A Dangerous Public 48 What Could Have Been Done? 49 What Are Your Customers and the General Public Saying? 50 What to Monitor 51 When to Dedicate Resources to Combating Negative Mentions 53 Processes to Track the Conversations Leading Up to an Attack 55 What Are Your Employees Saying? 58 What to Monitor 58 The "What If" Scenario 61 Wrap Up 62 Part II Assessing Social Media Threats Chapter 4 Threat Assessment 67 Case Study: Political Hacking 68 What Went Wrong? 69 The Changing Threat Landscape 70 Identifying the Threats 70 The Attackers 72 Threat Vectors 73 Threat Assessment and the Threat Management Lifecycle 76 Identify and Assess 77 Analyze 77 Execute 77 Threat Management in Action 79
4 Contents xiii H.U.M.O.R. Threat Assessment 80 Human Resources Threats 80 Utilization Threats 81 Monetary Threats 81 Operational Threats 82 Reputation Threats 83 Assessing Damage 85 Developing a Response 86 Wrap Up 90 Chapter 5 Whot Can Go Wrong 91 Case Study: Firesheep, A Real-World Example ofsocial Media Hacking 92 Dangers Specific to Social Networks 94 IT Security Restrictions to Protect Your Networks 95 Cyberstalking 96 Corporate Cyberstalking 97 Validating the End User 99 Determining Accountability 100 Data Scraping 100 Wrap Up 102 Part III Operations, Policies, & Processes Chapter 6 Social Media Security Policy Best Practices 105 Case Study: Growth of Social Media Policy Usage 107 What Is an Effective Social Media Security Policy? 108 Regulatory and legal Requirements 109 Managing In-house (Self-hosted) Applications 110 Managing Externally Hosted Applications 113 Enterprise-wide Coordination 116 Codes of Conduct and Acceptable Use 117 Roles and Responsibilities: The Community Manager 118 Education and Training 121 Policy Management 123 H.U.M.O.R. Guidelines 123
5 xiv Securing the Clicks: Network Security in the Age of Social Media Developing Your Social Media Security Policy 125 The Policy Team 125 Determining Policy Response 125 A Sample Social Media Security Policy 127 Wrap Up 135 Chapter 7 Human Resources: Strategy & Collaboration 137 Case Study: "Expensive Paperweight" Gets Fired 139 Identifying Business Processes, Regulations, and Legal Requirements 141 The Community Manager: Defining and Implementing 144 Small Companies'Human Resource Challenges 146 Medium-Sized Companies'Human Resource Challenges 148 Large Companies' Human Resource Challenges 149 Training 153 Training Community Managers 154 Training Employees 155 Wrap Up 159 Chapter 8 Utilization of Resources: Strategy & Collaboration 161 Case Study: Inappropriate Tweets 162 How Are Security Processes Handled? 163 Collaborating Securely 164 Utilizing Technology 165 Preventing Data Loss 170 Educating Employees 173 Wrap Up 175 Chapter 9 Monetary Considerations: Strategy & Collaboration 177 Case Study: Calculating the Cost of Data Loss 180 Costs of Implementing Controls 182 Costs of Threats and Countermeasures 184 Wrap Up 186 Chapter 10 Operations Management: Strategy & Collaboration 187 Case Study: Military Cyberprofiles 188 Operations Management Strategy 189 Roles and Responsibilities 189 Asset Management 190
6 Contents XV Security Awareness Training 192 Physical Security 193 Communications 193 Network Management 194 Access Control 195 Application Development and Testing 197 Compliance 199 Controls Auditing 200 Auditing Steps for Internal Security Tools and Social Media Sites 200 Auditing Steps for External Social Media Sites 201 Wrap Up 202 Chapter 11 Reputation Management: Strategy & Collaboration 203 Case Study: Domino's Reputation Attack 204 What Went Wrong? 205 What Did They Do Right? 205 Attempts to Ruin Brand Equity: From Logos to Brands 206 Actively Managing Your Reputation 207 Contacting Post Authors and Domain Owners 208 Requesting Content Removal 208 Resorting to Legal Recourse 210 Utilizing Search Engine Optimization 211 Zen and the Art of Social Media Strategy 212 When Marketing Campaigns Go Wrong 212 Creating Your Own Social Network 213 Who Do You Call in a Crisis? 216 Reducing Reputation Risks with Incident Management 216 Wrap Up 217 Part IV Monitoring & Reporting Chapter 12 Human Resources Monitoring & Reporting 221 Case Study: Facebook Posting Leads to Firing 223 Monitoring by Human Resources 223 Compliance 225 Focus of Monitoring 227 Can HR Ban Activity? 227 How to Monitor Employee Usage 228
7 xvi Securing the Clicks: Network Security in the Age of Social Media How to Use Social Media to Monitor Prospective Employees 230 Baseline Monitoring and Reporting Requirements 232 Policy Management 235 Wrap Up 235 Chapter 13 Utilization Monitoring & Reporting 237 Case Study: How Not to Respond 238 Who, What, Where, When, and How? 239 Technology 241 URL Filtering 242 Searching and Analyzing Data 243 Intellectual Property 246 Copyright 248 Incident Management 249 Reporting Metrics 251 Wrap Up 252 Chapter 14 Monetary Monitoring & Reporting 253 Case Study: The Budgetary Challenge 254 Social Media Security on a Limited Budget 256 Google Alerts 256 Google Trends 257 Google Blog Search 258 Google Insights for Search 259 Social Media Security on a Big Budget 260 Radian6 261 Lithium (formerly Seoul Labs) 262 Reputation.com 262 Training Costs 263 Wrap Up 264 Chapter 15 Operations Management Monitoring & Reporting 265 Case Study: Social Media Success 266 Types of Monitoring to Ensure Security Practices Are Followed 268 Data Loss Management: Tools and Practices 270 Alerting Systems 271 Usage Trend Tracking 271 Log File Archives 272
8 Contents XVli Monitoring and Management Tools 273 Monitoring Mentions 274 Monitoring Employees 276 Tracking Employee Usage 279 Benefits of Tracking Employee Usage 279 Dissemination of Policy Changes 280 Following the Social Media News 280 Wrap Up 281 Chapter 16 Reputation Management Monitoring & Reporting 283 Case Study: Uncontrolled Reputation Damage 284 Online Reputation Management 286 Brand Equity 287 Reputation Management and Employees 288 Setting Up a Monitoring System 289 Establishing a Baseline and Comparing Historical Periods 291 How to Make Good Use of Reputation Information 293 Wrap Up 294 PartV Social Media 3.0 Chapter 17 Assessing Your Social Media Strategy 297 How JAG's Doing 298 The Challenges Ahead 303 Determine the Implementation Processes 303 Security Is a Moving Target 304 Continuous Changes in Management and Policy 304 Check Your Sources 305 Authentication Systems Are Changing 306 Brand Attacks Are Hard to Track 306 Active Reputation Management 307 Respond 308 Report 308 Remediate 308 Wrap Up 309
9 xviii Securing the Clicks: Network Security in the Age of Social Media Chapter 18 The Future of Social Media Security 311 The Internet ofthings 312 Evolving Threats to the "Global Brain" 314 Loss of Control 315 Product and Data Threats 315 Erosion of Privacy 316 Geolocation Targeting 316 Attack of the Appliances 317 Attack of the Brands 317 "You R Owned!" 317 Inconsistent Regulations 318 The Best Defense Is a Good Offense 319 Jumping into the Deep End 320 Wrap Up 320 Appendix Resource Guide 321 index 327
Security Information and
Security Information and Event Management (SIEM) Implementation DAVID R. MILLER SHON HARRIS I ALLEN A. HARPER STEPHEN VANDYKE CHRIS BLASK Mc Graw Hill New York Chicago San Francisco Lisbon London Madrid
More informationSecurity Metrics. A Beginner's Guide. Caroline Wong. Mc Graw Hill. Singapore Sydney Toronto. Lisbon London Madrid Mexico City Milan New Delhi San Juan
Security Metrics A Beginner's Guide Caroline Wong Mc Graw Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Contents FOREWORD
More informationManagement. Oracle Fusion Middleware. 11 g Architecture and. Oracle Press ORACLE. Stephen Lee Gangadhar Konduri. Mc Grauu Hill.
ORACLE Oracle Press Oracle Fusion Middleware 11 g Architecture and Management Reza Shafii Stephen Lee Gangadhar Konduri Mc Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan
More informationTop Attacks in Social Media
Top Attacks in Social Media SESSION ID: HUM-F03A Gary Bahadur CEO KRAA Security @KRAASecurity 140 Characters of Pain What s the Problem with Social Media? No security strategies in place No enterprise-wide
More informationMaster Data Management and Data Governance Second Edition
Master Data Management and Data Governance Second Edition Alex Berson Larry Dubov Mc Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore
More informationfor Hundreds of Ready-to-Use Phrases to Set the Stage for Productive Conversations, Meetings, and Events Meryl Runion with Diane Windingland
PERFECT PHRASES for Hundreds of Ready-to-Use Phrases to Set the Stage for Productive Conversations, Meetings, and Events Meryl Runion with Diane Windingland Mc Graw Hill New York Chicago San Francisco
More informationCompensating the Sales Force
Compensating the Sales Force A Practical Guide to Designing Winning Sales Reward Programs Second Edition David J. Cichelli Me Graw Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan
More informationManager's Guide to Crisis Management
A Briefcase Book Manager's Guide to Crisis Management Jonathan Bernstein with Bruce Bonafede Me Graw Hill McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San
More informationWebLogic Server 11g Administration Handbook
ORACLE: Oracle Press Oracle WebLogic Server 11g Administration Handbook Sam R. Alapati Mc Graw Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore
More informationDevelopment Effort & Duration
Practical Software Project Estimation: A Toolkit for Estimating Software Development Effort & Duration International Software Benchmarking Standards Group Compiled and edited by Peter R. Hill Mc Grauu
More informationux BEST PRACTICES How To Achieve More Impact With User Experience Helmut Degen and XiaoweiYuan With support of Nan Guo Graw
ux BEST PRACTICES How To Achieve More Impact With User Experience Helmut Degen and XiaoweiYuan With support of Nan Guo Graw New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi
More informationTuning Tips & Techniques
ORACLE Oracle Press Oracle E-Business Suite 12 Tuning Tips & Techniques Richard Bingham Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore
More informationWHITE PAPER Mapping Organizational Roles & Responsibilities for Social Media Risk. A Hootsuite & Nexgate White Paper
WHITE PAPER Mapping Organizational Roles & Responsibilities for Social Media Risk A Hootsuite & Nexgate White Paper Mapping Organizational Roles & Responsibilities for Social Media Risk Executive Summary
More informationCONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker
ALL ElNis ONE CEH Certified Ethical Hacker EXAM GUIDE Matt Walker Mc Grain/ New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto McGraw-Hill
More informationBuilding and Managing
ORACLE Oracle Press' Building and Managing a Cloud Using Oracle Enterprise Manager 12c Madhup Gulati Adeesh Fulay Sudip Datta Mc Graw Hill Education New York Chicago San Francisco Lisbon London Madrid
More informationPublic Relations in Schools
Public Relations in Schools Fifth Edition Theodore J. Kowalski University of Dayton Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan
More informationVISUALIZING DATA POWER VIEW. with MICROSOFT. Brian Larson. Mark Davis Dan English Paui Purington. Mc Grauu. Sydney Toronto
VISUALIZING DATA with MICROSOFT POWER VIEW Brian Larson Mark Davis Dan English Paui Purington Mc Grauu New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore
More informationCONTEMPORARY DIRECT & INTERACTIVE MARKETING
SECOND EDITION CONTEMPORARY DIRECT & INTERACTIVE MARKETING Lisa D. Spiller Christopher Newport University Martin Baier Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape
More informationRisk Analysis and the Security Survey
Risk Analysis and the Security Survey Fourth Edition James F. Broder Eugene Tucker ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Butterworth-Heinemann
More informationApplications. Oracle WebCenter 11 g Handbook: Build Rich, Customizable Enterprise 2.0. Oracle Press ORACLE. Philipp Weckerle.
ORACLE Oracle Press Oracle WebCenter 11 g Handbook: Build Rich, Customizable Enterprise 2.0 Applications Frederic Desbiens Peter Moskovits Philipp Weckerle Mc Graw Hill New York Chicago San Francisco Lisbon
More informationLean Supply Chain and Logistics Management
Lean Supply Chain and Logistics Management Paul Myerson Me Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto CONTENTS CHAPTER
More informationProgramming Flaws and How to Fix Them
19 ö Programming Flaws and How to Fix Them MICHAEL HOWARD DAVID LEBLANC JOHN VIEGA McGraw-Hill /Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City- Milan New Delhi San Juan Seoul Singapore
More informationManager's Guide to Performance Management
A Ok Briefcase Book Manager's Guide to Performance Management Second Edition Robert Bacal Me Grain/ Hill McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San
More informationWeb Application Security
Web Application Security A Beginner's Guide Bryan Sullivan Vincent Liu Mc r New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Contents
More informationSocial Media Marketing
Social Media Marketing Tracy L. Tuten East Carolina University Michael R. Solomon The University of Manchester (U.K.) Saint Josephs University Boston Columbus Indianapolis New York San Francisco Upper
More informationImplementation & Administration
Microsoft SQL Server 2008 R2 Master Data Services: Implementation & Administration Tyler Graham Suzanne Selhorn Mc Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi
More informationCloud Computing: A Practical Approach
Cloud Computing: A Practical Approach Anthony T. Veite Toby J. Veite, Ph.D. Robert Elsenpeter Mc Graw Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul
More informationSHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE (2013-29) ON THIRD PARTY RELATIONSHIPS
SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE (2013-29) ON THIRD PARTY RELATIONSHIPS An overview of how the Shared Assessments Program SIG 2014
More informationManaging the Unmanageable
Managing the Unmanageable Rules, Tools, and Insights for Managing Software People and Teams MICKEY W. MANTLE RON LICHTY VVAddison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York
More informationDirect Marketing AN INTEGRATED APPROACH
Direct Marketing AN INTEGRATED APPROACH William J. McDonald, Ph.p. Hofstra UmyCrsity New Thinking An International Direct Marketing Agency fü lrwin islwcgraw-hhi Boston Buir Ridge, IL Dubuque, IA Madison,
More informationStudy Guide. Professional vsphere 4. VCP VMware Certified. (ExamVCP4IO) Robert Schmidt. IVIC GratAf Hill
VCP VMware Certified Professional vsphere 4 Study Guide (ExamVCP4IO) Robert Schmidt McGraw-Hill is an independent entity from VMware Inc. and is not affiliated with VMware Inc. in any manner.this study/training
More informationMacroeconomics. Manfred Gartner. Prentice Hall THIRD EDITION. University of St Gallen, Switzerland. An imprint of Pearson Education
Macroeconomics THIRD EDITION Manfred Gartner University of St Gallen, Switzerland Prentice Hall FINANCIAL TIMES An imprint of Pearson Education Harlow, England London New York Boston San Francisco Toronto
More informationUnderstanding the Pros and Cons of Combination Networks 7. Acknowledgments Introduction. Establishing the Numbers of Clients and Servers 4
Mac OS X System Administration GUY HART-DAVIS Mc Graw Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Acknowledgments Introduction,
More informationDavid Jobber University of Bradford
8th edition David Jobber University of Bradford Geoffrey Lancaster London School of Commerce Prentice Hall FINANCIAL TIMES An imprint of Pearson Education Harlow, England London New York Boston San Francisco
More informationIntroduction. Chapter 1 Why Understanding Your Web Traffic Is Important to Your Business 3
Contents Foreword Introduction xix xxi Part I Measuring Success 1 Chapter 1 Why Understanding Your Web Traffic Is Important to Your Business 3 Website Measurement Why Do This?... 4 Information Web Analytics
More informationTHE PROFESSIONAL RISK MANAGERS' GUIDE TO THE ENERGY MARKET
THE PROFESSIONAL RISK MANAGERS' GUIDE TO THE ENERGY MARKET Edited by PETER C. FUSARO New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto
More informationProtecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez abenaventem@es.ibm.com IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
More information5 Lines of Defense You Need to Secure Your SharePoint Environment SharePoint Security Resource Kit
SharePoint Security Playbook 5 Lines of Defense You Need to Secure Your SharePoint Environment Contents IT S TIME TO THINK ABOUT SHAREPOINT SECURITY Challenge 1: Ensure access rights remain aligned with
More informationCisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education
Cisco A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents
More informationNinth Edition. David W. Cravens. Nigel F. Piercy. McGraw-frSiBI irwin. M.j. Neeley School of Business Texas Christian University
Ninth Edition David W. Cravens M.j. Neeley School of Business Texas Christian University Nigel F. Piercy Warwick Business School The University of Warwick McGraw-frSiBI irwin Boston Burr Ridge, IL Dubuque,
More informationData Warehouse Design
Data Warehouse Design Modern Principles and Methodologies Matteo Golfarelli Stefano Rizzi Translated by Claudio Pagliarani Mc Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City
More informationThe Process. Improvement. Handbook. A Blueprint for Managing Change and. Increasing Organizational Performance. Tristan Boutros.
The Process Improvement Handbook A Blueprint for Managing Change and Increasing Organizational Performance Tristan Boutros Tim Purdie Illustrations by Dustin Duffy Mc Graw Hill Education New York Chicago
More informationWeb Protection for Your Business, Customers and Data
WHITE PAPER: WEB PROTECTION FOR YOUR BUSINESS, CUSTOMERS............ AND.... DATA........................ Web Protection for Your Business, Customers and Data Who should read this paper For security decision
More informationPurchasing and Supply Chain Management
Eighth Edition Purchasing and Supply Chain Management KENNETH LYSONS MA, MEd, PhD, Dipl.PA, AcDip.Ed., DMS, FCIS, FCIPS, Flnst M, MILT BRIAN FARRINGTON BSc(Econ), MSc, PhD, FCIPS PEARSON Harlow, England
More informationCONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT
CONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT ABSTRACT Identity and access governance should be deployed across all types of users associated with an organization -- not just regular users
More informationHow to Implement Lean Manufacturing
How to Implement Lean Manufacturing Lonnie Wilson Me Graw Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Contents Preface Acknowledgments
More informationINCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION
" - * INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION CHRIS PROSISE KEVIN MANDIA McGraw-Hill /Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul
More informationNetworking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG
Networking A Beginner's Guide Sixth Edition BRUCE HALLBERG Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents Acknowledgments
More informationModule 1: Introduction to Designing Security
Module 1: Introduction to Designing Security Table of Contents Module Overview 1-1 Lesson 1: Overview of Designing Security for Microsoft Networks 1-2 Lesson 2: Introducing Contoso Pharmaceuticals: A Case
More informationSoftware Security. Building Security In. Gary McGraw. A Addison-Wesley
Software Security Building Security In Gary McGraw A Addison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal London Munich Paris Madrid Capetown Sydney Tokyo Singapore
More informationSecuring the Cloud. Cloud Computer Security Techniques and Tactics. Vic (J.R.) Winkler. Technical Editor Bill Meine ELSEVIER
Securing the Cloud Cloud Computer Security Techniques and Tactics Vic (J.R.) Winkler Technical Editor Bill Meine ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO
More informationSharePoint 2010. Overview, Governance, and Planning. (^Rll^^fc^ i ip?"^biifiis:'iissiipi. Scott Jamison. Susan Hanley Mauro Cardarelli.
Ec,V$%fMM SharePoint 2010 i ip?"^biifiis:'iissiipi Overview, Governance, (^Rll^^fc^ and Planning Ipft^'" Scott Jamison Susan Hanley Mauro Cardarelli Upper Saddle River, NJ Boston Indianapolis San Francisco
More informationIntegration in Practice
ORACLe Oracle Press Hudson Continuous Integration in Practice Ed Burns and Winston Prakash Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore
More informationCompliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
More informationOracle Big Data Handbook
ORACLG Oracle Press Oracle Big Data Handbook Tom Plunkett Brian Macdonald Bruce Nelson Helen Sun Khader Mohiuddin Debra L. Harding David Segleau Gokula Mishra Mark F. Hornick Robert Stackowiak Keith Laker
More informationThe webinar will begin shortly
The webinar will begin shortly An Introduction to Security Intelligence Presented by IBM Security Chris Ross Senior Security Specialist, IBM Security Agenda The Security Landscape An Introduction to Security
More informationFinancial Times Prentice Hall is an imprint of
mnr\ Financial Times Prentice Hall is an imprint of Harlow, England London New York Boston San Francisco Toronto Sydney Singapore Hong Kong Tokyo Seoul Taipei New Delhi Cape Town Madrid Mexico City Amsterdam
More informationRelationship marketing
Relationship marketing WBIbliothek Exploring relational strategies in marketing FOURTH EDITION JOHN EGAN London South Bank University Financial Times Prentice Hall is an imprint of Harlow, England London
More informationFundamentals of Mobile and Pervasive Computing
Fundamentals of Mobile and Pervasive Computing Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert Technische Universitat Darmstadt FACHBEREICH INFORMATIK B1BLIOTHEK Inventar-Nr.:
More informationTop Digital Experts Share the. Formula for Tangible Returns. ort Vour Marketing Investment ERIC GREENBERG AND ALEXANDER KATES. Mc Graw Hill Education
STRATEGIC DIGITAL MARKETING Top Digital Experts Share the Formula for Tangible Returns ort Vour Marketing Investment ERIC GREENBERG AND ALEXANDER KATES Mc Graw Hill Education New York Chicago San Francisco
More informationPMP Project Management Professional Study Guide, Third Edition
PMP Project Management Professional Study Guide, Third Edition Joseph Phillips McGraw-Hill is an independent entity from the Project Management Institute, Inc. and is not affiliated with the Project Management
More informationWHITE PAPER The Five Step Guide to Better Social Media Security
WHITE PAPER The Five Step Guide to Better Social Media Security A Hootsuite White Paper The Five Step Guide to Better Social Media Security A Hootsuite White Paper In 2013, not a single month went by without
More informationBuilding VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&
Building VPNs With IPSec and MPLS Nam-Kee Tan CCIE #4307 S& -.jr."..- i McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto
More informationIMPROVEMENT THE PRACTITIONER'S GUIDE TO DATA QUALITY DAVID LOSHIN
i I I I THE PRACTITIONER'S GUIDE TO DATA QUALITY IMPROVEMENT DAVID LOSHIN ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann
More informationJames Dicks. 6 Ways to Trade the Dollar. McGraw-Hill
2008 AGI-Information Management Consultants May be used for personal purporses only or by libraries associated to dandelon.com network. FOREX MADE EASY 6 Ways to Trade the Dollar James Dicks McGraw-Hill
More informationNEW ZEALAND FINANCIAL ACCOUNTING
J Q OOO####I i ' WWc #OOO####CI # «0O O0OQi###t i oi oo ###0 # i CRAIG DEEGAN / GRANT SAMKIN RMIT University University of Waikato NEW ZEALAND FINANCIAL ACCOUNTING The McGraw-Hill Companieii Sydney New
More informationINCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
More informationSocial Media. A brief overview of the Social Media module
Social Media A brief overview of the Social Media module Title of Page to Appear Here in Arial Bold. Size: 32pt Line 1 of bullet point text to appear here in Arial regular. Size: 18pt Line 2 of bullet
More informationCustomer Relationship. Management. Ed Peelen and Rob Beltman
Customer Relationship Management Ed Peelen and Rob Beltman PEARSON Harlow, England London New York Boston San Francisco Toronto Sydney Auckland Singapore Hong Kong Tokyo Seoul Taipei New Delhi Cape Town
More informationRFID Field Guide. Deploying Radio Frequency Identification Systems. Manish Bhuptani Shahram Moradpour. Sun Microsystems Press A Prentice Hall Title
RFID Field Guide Deploying Radio Frequency Identification Systems Manish Bhuptani Shahram Moradpour Sun Microsystems Press A Prentice Hall Title PRENTICE HALL PTR Prentice Hall Professional Technical Reference
More informationSearch and Social. The Definitive Guide to Real-Time Content Marketing. Rob Garner. WILEY John Wiley & Sons, Inc.
Search and Social The Definitive Guide to Real-Time Content Marketing Rob Garner WILEY John Wiley & Sons, Inc. Contents Foreword xix Introduction t xxi Chapter 1 Real-Time Publishing and Marketing 1 Introduction
More informationHow To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
More informationCAST Center for Advanced Security Training
CAST Center for Advanced Security Training Advanced Security Training (CAST) EC-Council s Center for Advanced Security Training (CAST) was created to address the need for highly technical and Advanced
More informationThe PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program subsidiaries) 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis
More informationStrengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
More informationSOCIAL MEDIA ANALYTICS AND TOOLS 101
SOCIAL MEDIA ANALYTICS AND TOOLS 101 Ken Paterson VP Research Operations/ Director, Credit Advisory Service kpaterson@mercatoradvisorygroup.com 8 Clock Tower Place, Suite 420 Maynard, MA 01754 phone: 1(781)
More informationA BUSINESS CASE FOR BEHAVIORAL ANALYTICS. White Paper
A BUSINESS CASE FOR BEHAVIORAL ANALYTICS White Paper Introduction What is Behavioral 1 In a world in which web applications and websites are becoming ever more diverse and complicated, running them effectively
More informationMeasuring Data Quality for Ongoing Improvement
Measuring Data Quality for Ongoing Improvement A Data Quality Assessment Framework Laura Sebastian-Coleman ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE
More informationC ONTENTS. Acknowledgments
kincaidtoc.fm Page vii Friday, September 20, 2002 1:25 PM C ONTENTS Preface Acknowledgments xxi xxvii Part 1 CRM: Is It Right for Your Company? 1 Chapter 1 Commerce in the 21st Century 3 1.1 Understanding
More informationGoodbye Spokesperson, Hello Steward
Goodbye Spokesperson, Hello Steward The Transformation of Corporate Communications Once heralded as the seat held by the best storyteller in the company, corporate communications is no longer about amplifying
More informationAccenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges
Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287
More informationMIKE COHN. Software Development Using Scrum. VAddison-Wesley. Upper Saddle River, NJ Boston Indianapolis San Francisco
Software Development Using Scrum MIKE COHN VAddison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal London Munich Paris Madrid Cape Town Sydney Tokyo Singapore
More informationIowa County Government Social Media Use Policy
Iowa County Government Social Media Use Policy This policy outlines appropriate use of social media, as it relates to Iowa County, by employees and departments for official and personal use. This policy
More informationENTERPRISE RESOURCE PLANNING
ENTERPRISE RESOURCE PLANNING ~SECOND E DITION~ ENTERPRISE RESOURCE PLANNING ~SECOND E DITION~ Alexis Leon L&L Consultancy Services Pvt Ltd Kochi Tata McGraw-Hill Publishing Company Limited NEW DELHI McGraw-Hill
More informationThe PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page
More informationMeasuring and. Communicating. Security's Value. A Compendium of Metrics. for Enterprise Protection
Measuring and Communicating Security's Value A Compendium of Metrics for Enterprise Protection George Campbell AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE
More informationForget the hype Ways to actually use Social Media to benefit your business
Forget the hype Ways to actually use Social Media to benefit your business What is Social Media? Engaging with other businesses/individuals online + Effective Communication + Real-time Customer Support
More informationManufacturing Planning and Control for Supply Chain Management
Manufacturing Planning and Control for Supply Chain Management APICS/CPIM Certification Edition F. Robert Jacobs Indiana University William L. Berry The Ohio State University (Emeritus) D.ClayWhybark University
More informationElectric Power Distribution
Electric Power Distribution A S Pabla Consulting Engineer and Former Chief Engineer Punjab State Electricity Board McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New
More informationComputing. Federal Cloud. Service Providers. The Definitive Guide for Cloud. Matthew Metheny ELSEVIER. Syngress is NEWYORK OXFORD PARIS SAN DIEGO
Federal Cloud Computing The Definitive Guide for Cloud Service Providers Matthew Metheny ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO
More informationBusiness resilience: The best defense is a good offense
IBM Business Continuity and Resiliency Services January 2009 Business resilience: The best defense is a good offense Develop a best practices strategy using a tiered approach Page 2 Contents 2 Introduction
More informationCAREER DEVELOPMENT INTERVENTIONS IN THE 21 ST CENTURY
CAREER DEVELOPMENT INTERVENTIONS IN THE 21 ST CENTURY FOURTH EDITION SPENCER G. NILES Pennsylvania State University JOANN HARRIS-BOWLSBEY Kuder, Inc., Adel, Iowa PEARSON Boston Columbus Indianapolis New
More informationComprehensive real-time protection against Advanced Threats and data theft
TRITON AP-WEB Comprehensive real-time protection against Advanced Threats and data theft Your business and its data are under constant attack. Traditional security solutions no longer provide sufficient
More informationRFID in the Supply Chain
RFID in the Supply Chain Pedro M. Reyes Me Gram/ Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Foreword Preface ix xi Part
More informationAn Introduction. Global Edition. "University of North Carolina. Northwestern University
An Introduction Global Edition "University of North Carolina Northwestern University Boston Columbus Indianapolis NewYork San Francisco Upper Saddle River Amsterdam CapeTown Dubai London Madrid Milan Munich
More informationVALUATION The Art and Science of Corporate Investment Decisions
VALUATION The Art and Science of Corporate Investment Decisions Second Edition SHERIDAN TITMAN University of Texas at Austin JOHN D. MARTIN Baylor University Prentice Hall Boston Columbus Indianapolis
More informationsecurity changes with Orange focus on your business, we focus on your security
security changes with Orange focus on your business, we focus on your security the only constant in security is change New uses and new technologies, proliferation of platforms and new workspaces in a
More informationMarketin. Global Edition 14
Marketin Global Edition 14 PHILIP Kotler Northwestern University GARY Armstrong University of North Carolina Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai
More information