Contents. Assessing Social Media Security. Chapter! The Social Media Security Process 3

Size: px
Start display at page:

Download "Contents. Assessing Social Media Security. Chapter! The Social Media Security Process 3"

Transcription

1 Securing the Clicks: Network Security in the Age of Social Media Gary Bahadur Jason I nasi Alex de Carvalho Mc ssr New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto

2 Contents Foreword Introduction xix xxi Part I Assessing Social Media Security Chapter! The Social Media Security Process 3 Case Study: Reputation Damage from an Unprepared Social Media Strategy 4 What Went Wrong? 5 How Security Has Changed in the Recent Past 6 The Assessment Process 7 Why Follow the Assessment Process? 8 Organizational Analysis: Your Industry Online, the Good and the Bad 9 Analyzing Your Social Media Initiatives 10 Analyzing Your Existing Internal Processes 11 Securing Customer Data 11 Securing Channels of Communication 12 Identifying the Current Gaps in How Your Company Utilizes Social Media Securely Competitive Analysis 13 Wrap Up 15 Chapter 2 Security Strategy Analysis: Foundation of Your Security Policy 17 Case Study: Hacking Is an Equal Opportunity Sport 18 The H.U.M.O.R. Matrix 19 Human Resources 21 Assessing the Current Environment 21 Measuring the Current State: H.U.M.O.R. Matrix 26 Utilization of Resources and Assets 27 Assessing the Current Environment 28 Measuring the Current State: H.U.M.O.R. Matrix 32

3 xii Securing the Clicks: Network Security in the Age of Social Media Monetary Considerations 34 Assessing the Current Environment 34 Measuring the Current State: H.U.M.O.R. Matrix 35 Operations Management 36 Assessing the Current Environment 37 Measuring the Current State: H.U.M.O.R. Matrix 40 Reputation Management 41 Assessing the Current Environment 41 Measuring the Current State: H.U.M.O.R. Matrix 44 Wrap Up 45 Chapter 3 Monitoring in the Social Media Landscape 47 Case Study: A Dangerous Public 48 What Could Have Been Done? 49 What Are Your Customers and the General Public Saying? 50 What to Monitor 51 When to Dedicate Resources to Combating Negative Mentions 53 Processes to Track the Conversations Leading Up to an Attack 55 What Are Your Employees Saying? 58 What to Monitor 58 The "What If" Scenario 61 Wrap Up 62 Part II Assessing Social Media Threats Chapter 4 Threat Assessment 67 Case Study: Political Hacking 68 What Went Wrong? 69 The Changing Threat Landscape 70 Identifying the Threats 70 The Attackers 72 Threat Vectors 73 Threat Assessment and the Threat Management Lifecycle 76 Identify and Assess 77 Analyze 77 Execute 77 Threat Management in Action 79

4 Contents xiii H.U.M.O.R. Threat Assessment 80 Human Resources Threats 80 Utilization Threats 81 Monetary Threats 81 Operational Threats 82 Reputation Threats 83 Assessing Damage 85 Developing a Response 86 Wrap Up 90 Chapter 5 Whot Can Go Wrong 91 Case Study: Firesheep, A Real-World Example ofsocial Media Hacking 92 Dangers Specific to Social Networks 94 IT Security Restrictions to Protect Your Networks 95 Cyberstalking 96 Corporate Cyberstalking 97 Validating the End User 99 Determining Accountability 100 Data Scraping 100 Wrap Up 102 Part III Operations, Policies, & Processes Chapter 6 Social Media Security Policy Best Practices 105 Case Study: Growth of Social Media Policy Usage 107 What Is an Effective Social Media Security Policy? 108 Regulatory and legal Requirements 109 Managing In-house (Self-hosted) Applications 110 Managing Externally Hosted Applications 113 Enterprise-wide Coordination 116 Codes of Conduct and Acceptable Use 117 Roles and Responsibilities: The Community Manager 118 Education and Training 121 Policy Management 123 H.U.M.O.R. Guidelines 123

5 xiv Securing the Clicks: Network Security in the Age of Social Media Developing Your Social Media Security Policy 125 The Policy Team 125 Determining Policy Response 125 A Sample Social Media Security Policy 127 Wrap Up 135 Chapter 7 Human Resources: Strategy & Collaboration 137 Case Study: "Expensive Paperweight" Gets Fired 139 Identifying Business Processes, Regulations, and Legal Requirements 141 The Community Manager: Defining and Implementing 144 Small Companies'Human Resource Challenges 146 Medium-Sized Companies'Human Resource Challenges 148 Large Companies' Human Resource Challenges 149 Training 153 Training Community Managers 154 Training Employees 155 Wrap Up 159 Chapter 8 Utilization of Resources: Strategy & Collaboration 161 Case Study: Inappropriate Tweets 162 How Are Security Processes Handled? 163 Collaborating Securely 164 Utilizing Technology 165 Preventing Data Loss 170 Educating Employees 173 Wrap Up 175 Chapter 9 Monetary Considerations: Strategy & Collaboration 177 Case Study: Calculating the Cost of Data Loss 180 Costs of Implementing Controls 182 Costs of Threats and Countermeasures 184 Wrap Up 186 Chapter 10 Operations Management: Strategy & Collaboration 187 Case Study: Military Cyberprofiles 188 Operations Management Strategy 189 Roles and Responsibilities 189 Asset Management 190

6 Contents XV Security Awareness Training 192 Physical Security 193 Communications 193 Network Management 194 Access Control 195 Application Development and Testing 197 Compliance 199 Controls Auditing 200 Auditing Steps for Internal Security Tools and Social Media Sites 200 Auditing Steps for External Social Media Sites 201 Wrap Up 202 Chapter 11 Reputation Management: Strategy & Collaboration 203 Case Study: Domino's Reputation Attack 204 What Went Wrong? 205 What Did They Do Right? 205 Attempts to Ruin Brand Equity: From Logos to Brands 206 Actively Managing Your Reputation 207 Contacting Post Authors and Domain Owners 208 Requesting Content Removal 208 Resorting to Legal Recourse 210 Utilizing Search Engine Optimization 211 Zen and the Art of Social Media Strategy 212 When Marketing Campaigns Go Wrong 212 Creating Your Own Social Network 213 Who Do You Call in a Crisis? 216 Reducing Reputation Risks with Incident Management 216 Wrap Up 217 Part IV Monitoring & Reporting Chapter 12 Human Resources Monitoring & Reporting 221 Case Study: Facebook Posting Leads to Firing 223 Monitoring by Human Resources 223 Compliance 225 Focus of Monitoring 227 Can HR Ban Activity? 227 How to Monitor Employee Usage 228

7 xvi Securing the Clicks: Network Security in the Age of Social Media How to Use Social Media to Monitor Prospective Employees 230 Baseline Monitoring and Reporting Requirements 232 Policy Management 235 Wrap Up 235 Chapter 13 Utilization Monitoring & Reporting 237 Case Study: How Not to Respond 238 Who, What, Where, When, and How? 239 Technology 241 URL Filtering 242 Searching and Analyzing Data 243 Intellectual Property 246 Copyright 248 Incident Management 249 Reporting Metrics 251 Wrap Up 252 Chapter 14 Monetary Monitoring & Reporting 253 Case Study: The Budgetary Challenge 254 Social Media Security on a Limited Budget 256 Google Alerts 256 Google Trends 257 Google Blog Search 258 Google Insights for Search 259 Social Media Security on a Big Budget 260 Radian6 261 Lithium (formerly Seoul Labs) 262 Reputation.com 262 Training Costs 263 Wrap Up 264 Chapter 15 Operations Management Monitoring & Reporting 265 Case Study: Social Media Success 266 Types of Monitoring to Ensure Security Practices Are Followed 268 Data Loss Management: Tools and Practices 270 Alerting Systems 271 Usage Trend Tracking 271 Log File Archives 272

8 Contents XVli Monitoring and Management Tools 273 Monitoring Mentions 274 Monitoring Employees 276 Tracking Employee Usage 279 Benefits of Tracking Employee Usage 279 Dissemination of Policy Changes 280 Following the Social Media News 280 Wrap Up 281 Chapter 16 Reputation Management Monitoring & Reporting 283 Case Study: Uncontrolled Reputation Damage 284 Online Reputation Management 286 Brand Equity 287 Reputation Management and Employees 288 Setting Up a Monitoring System 289 Establishing a Baseline and Comparing Historical Periods 291 How to Make Good Use of Reputation Information 293 Wrap Up 294 PartV Social Media 3.0 Chapter 17 Assessing Your Social Media Strategy 297 How JAG's Doing 298 The Challenges Ahead 303 Determine the Implementation Processes 303 Security Is a Moving Target 304 Continuous Changes in Management and Policy 304 Check Your Sources 305 Authentication Systems Are Changing 306 Brand Attacks Are Hard to Track 306 Active Reputation Management 307 Respond 308 Report 308 Remediate 308 Wrap Up 309

9 xviii Securing the Clicks: Network Security in the Age of Social Media Chapter 18 The Future of Social Media Security 311 The Internet ofthings 312 Evolving Threats to the "Global Brain" 314 Loss of Control 315 Product and Data Threats 315 Erosion of Privacy 316 Geolocation Targeting 316 Attack of the Appliances 317 Attack of the Brands 317 "You R Owned!" 317 Inconsistent Regulations 318 The Best Defense Is a Good Offense 319 Jumping into the Deep End 320 Wrap Up 320 Appendix Resource Guide 321 index 327

Security Information and

Security Information and Security Information and Event Management (SIEM) Implementation DAVID R. MILLER SHON HARRIS I ALLEN A. HARPER STEPHEN VANDYKE CHRIS BLASK Mc Graw Hill New York Chicago San Francisco Lisbon London Madrid

More information

Security Metrics. A Beginner's Guide. Caroline Wong. Mc Graw Hill. Singapore Sydney Toronto. Lisbon London Madrid Mexico City Milan New Delhi San Juan

Security Metrics. A Beginner's Guide. Caroline Wong. Mc Graw Hill. Singapore Sydney Toronto. Lisbon London Madrid Mexico City Milan New Delhi San Juan Security Metrics A Beginner's Guide Caroline Wong Mc Graw Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Contents FOREWORD

More information

Management. Oracle Fusion Middleware. 11 g Architecture and. Oracle Press ORACLE. Stephen Lee Gangadhar Konduri. Mc Grauu Hill.

Management. Oracle Fusion Middleware. 11 g Architecture and. Oracle Press ORACLE. Stephen Lee Gangadhar Konduri. Mc Grauu Hill. ORACLE Oracle Press Oracle Fusion Middleware 11 g Architecture and Management Reza Shafii Stephen Lee Gangadhar Konduri Mc Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan

More information

Top Attacks in Social Media

Top Attacks in Social Media Top Attacks in Social Media SESSION ID: HUM-F03A Gary Bahadur CEO KRAA Security @KRAASecurity 140 Characters of Pain What s the Problem with Social Media? No security strategies in place No enterprise-wide

More information

Master Data Management and Data Governance Second Edition

Master Data Management and Data Governance Second Edition Master Data Management and Data Governance Second Edition Alex Berson Larry Dubov Mc Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore

More information

for Hundreds of Ready-to-Use Phrases to Set the Stage for Productive Conversations, Meetings, and Events Meryl Runion with Diane Windingland

for Hundreds of Ready-to-Use Phrases to Set the Stage for Productive Conversations, Meetings, and Events Meryl Runion with Diane Windingland PERFECT PHRASES for Hundreds of Ready-to-Use Phrases to Set the Stage for Productive Conversations, Meetings, and Events Meryl Runion with Diane Windingland Mc Graw Hill New York Chicago San Francisco

More information

Compensating the Sales Force

Compensating the Sales Force Compensating the Sales Force A Practical Guide to Designing Winning Sales Reward Programs Second Edition David J. Cichelli Me Graw Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan

More information

Manager's Guide to Crisis Management

Manager's Guide to Crisis Management A Briefcase Book Manager's Guide to Crisis Management Jonathan Bernstein with Bruce Bonafede Me Graw Hill McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San

More information

WebLogic Server 11g Administration Handbook

WebLogic Server 11g Administration Handbook ORACLE: Oracle Press Oracle WebLogic Server 11g Administration Handbook Sam R. Alapati Mc Graw Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore

More information

Development Effort & Duration

Development Effort & Duration Practical Software Project Estimation: A Toolkit for Estimating Software Development Effort & Duration International Software Benchmarking Standards Group Compiled and edited by Peter R. Hill Mc Grauu

More information

ux BEST PRACTICES How To Achieve More Impact With User Experience Helmut Degen and XiaoweiYuan With support of Nan Guo Graw

ux BEST PRACTICES How To Achieve More Impact With User Experience Helmut Degen and XiaoweiYuan With support of Nan Guo Graw ux BEST PRACTICES How To Achieve More Impact With User Experience Helmut Degen and XiaoweiYuan With support of Nan Guo Graw New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi

More information

Tuning Tips & Techniques

Tuning Tips & Techniques ORACLE Oracle Press Oracle E-Business Suite 12 Tuning Tips & Techniques Richard Bingham Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore

More information

WHITE PAPER Mapping Organizational Roles & Responsibilities for Social Media Risk. A Hootsuite & Nexgate White Paper

WHITE PAPER Mapping Organizational Roles & Responsibilities for Social Media Risk. A Hootsuite & Nexgate White Paper WHITE PAPER Mapping Organizational Roles & Responsibilities for Social Media Risk A Hootsuite & Nexgate White Paper Mapping Organizational Roles & Responsibilities for Social Media Risk Executive Summary

More information

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker ALL ElNis ONE CEH Certified Ethical Hacker EXAM GUIDE Matt Walker Mc Grain/ New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto McGraw-Hill

More information

Building and Managing

Building and Managing ORACLE Oracle Press' Building and Managing a Cloud Using Oracle Enterprise Manager 12c Madhup Gulati Adeesh Fulay Sudip Datta Mc Graw Hill Education New York Chicago San Francisco Lisbon London Madrid

More information

Public Relations in Schools

Public Relations in Schools Public Relations in Schools Fifth Edition Theodore J. Kowalski University of Dayton Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan

More information

VISUALIZING DATA POWER VIEW. with MICROSOFT. Brian Larson. Mark Davis Dan English Paui Purington. Mc Grauu. Sydney Toronto

VISUALIZING DATA POWER VIEW. with MICROSOFT. Brian Larson. Mark Davis Dan English Paui Purington. Mc Grauu. Sydney Toronto VISUALIZING DATA with MICROSOFT POWER VIEW Brian Larson Mark Davis Dan English Paui Purington Mc Grauu New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore

More information

CONTEMPORARY DIRECT & INTERACTIVE MARKETING

CONTEMPORARY DIRECT & INTERACTIVE MARKETING SECOND EDITION CONTEMPORARY DIRECT & INTERACTIVE MARKETING Lisa D. Spiller Christopher Newport University Martin Baier Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape

More information

Risk Analysis and the Security Survey

Risk Analysis and the Security Survey Risk Analysis and the Security Survey Fourth Edition James F. Broder Eugene Tucker ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Butterworth-Heinemann

More information

Applications. Oracle WebCenter 11 g Handbook: Build Rich, Customizable Enterprise 2.0. Oracle Press ORACLE. Philipp Weckerle.

Applications. Oracle WebCenter 11 g Handbook: Build Rich, Customizable Enterprise 2.0. Oracle Press ORACLE. Philipp Weckerle. ORACLE Oracle Press Oracle WebCenter 11 g Handbook: Build Rich, Customizable Enterprise 2.0 Applications Frederic Desbiens Peter Moskovits Philipp Weckerle Mc Graw Hill New York Chicago San Francisco Lisbon

More information

Lean Supply Chain and Logistics Management

Lean Supply Chain and Logistics Management Lean Supply Chain and Logistics Management Paul Myerson Me Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto CONTENTS CHAPTER

More information

Programming Flaws and How to Fix Them

Programming Flaws and How to Fix Them 19 ö Programming Flaws and How to Fix Them MICHAEL HOWARD DAVID LEBLANC JOHN VIEGA McGraw-Hill /Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City- Milan New Delhi San Juan Seoul Singapore

More information

Manager's Guide to Performance Management

Manager's Guide to Performance Management A Ok Briefcase Book Manager's Guide to Performance Management Second Edition Robert Bacal Me Grain/ Hill McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San

More information

Web Application Security

Web Application Security Web Application Security A Beginner's Guide Bryan Sullivan Vincent Liu Mc r New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Contents

More information

Social Media Marketing

Social Media Marketing Social Media Marketing Tracy L. Tuten East Carolina University Michael R. Solomon The University of Manchester (U.K.) Saint Josephs University Boston Columbus Indianapolis New York San Francisco Upper

More information

Implementation & Administration

Implementation & Administration Microsoft SQL Server 2008 R2 Master Data Services: Implementation & Administration Tyler Graham Suzanne Selhorn Mc Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi

More information

Cloud Computing: A Practical Approach

Cloud Computing: A Practical Approach Cloud Computing: A Practical Approach Anthony T. Veite Toby J. Veite, Ph.D. Robert Elsenpeter Mc Graw Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul

More information

SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE (2013-29) ON THIRD PARTY RELATIONSHIPS

SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE (2013-29) ON THIRD PARTY RELATIONSHIPS SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE (2013-29) ON THIRD PARTY RELATIONSHIPS An overview of how the Shared Assessments Program SIG 2014

More information

Managing the Unmanageable

Managing the Unmanageable Managing the Unmanageable Rules, Tools, and Insights for Managing Software People and Teams MICKEY W. MANTLE RON LICHTY VVAddison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York

More information

Direct Marketing AN INTEGRATED APPROACH

Direct Marketing AN INTEGRATED APPROACH Direct Marketing AN INTEGRATED APPROACH William J. McDonald, Ph.p. Hofstra UmyCrsity New Thinking An International Direct Marketing Agency fü lrwin islwcgraw-hhi Boston Buir Ridge, IL Dubuque, IA Madison,

More information

Study Guide. Professional vsphere 4. VCP VMware Certified. (ExamVCP4IO) Robert Schmidt. IVIC GratAf Hill

Study Guide. Professional vsphere 4. VCP VMware Certified. (ExamVCP4IO) Robert Schmidt. IVIC GratAf Hill VCP VMware Certified Professional vsphere 4 Study Guide (ExamVCP4IO) Robert Schmidt McGraw-Hill is an independent entity from VMware Inc. and is not affiliated with VMware Inc. in any manner.this study/training

More information

Macroeconomics. Manfred Gartner. Prentice Hall THIRD EDITION. University of St Gallen, Switzerland. An imprint of Pearson Education

Macroeconomics. Manfred Gartner. Prentice Hall THIRD EDITION. University of St Gallen, Switzerland. An imprint of Pearson Education Macroeconomics THIRD EDITION Manfred Gartner University of St Gallen, Switzerland Prentice Hall FINANCIAL TIMES An imprint of Pearson Education Harlow, England London New York Boston San Francisco Toronto

More information

Understanding the Pros and Cons of Combination Networks 7. Acknowledgments Introduction. Establishing the Numbers of Clients and Servers 4

Understanding the Pros and Cons of Combination Networks 7. Acknowledgments Introduction. Establishing the Numbers of Clients and Servers 4 Mac OS X System Administration GUY HART-DAVIS Mc Graw Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Acknowledgments Introduction,

More information

David Jobber University of Bradford

David Jobber University of Bradford 8th edition David Jobber University of Bradford Geoffrey Lancaster London School of Commerce Prentice Hall FINANCIAL TIMES An imprint of Pearson Education Harlow, England London New York Boston San Francisco

More information

Introduction. Chapter 1 Why Understanding Your Web Traffic Is Important to Your Business 3

Introduction. Chapter 1 Why Understanding Your Web Traffic Is Important to Your Business 3 Contents Foreword Introduction xix xxi Part I Measuring Success 1 Chapter 1 Why Understanding Your Web Traffic Is Important to Your Business 3 Website Measurement Why Do This?... 4 Information Web Analytics

More information

THE PROFESSIONAL RISK MANAGERS' GUIDE TO THE ENERGY MARKET

THE PROFESSIONAL RISK MANAGERS' GUIDE TO THE ENERGY MARKET THE PROFESSIONAL RISK MANAGERS' GUIDE TO THE ENERGY MARKET Edited by PETER C. FUSARO New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto

More information

Protecting against cyber threats and security breaches

Protecting against cyber threats and security breaches Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez abenaventem@es.ibm.com IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So

More information

5 Lines of Defense You Need to Secure Your SharePoint Environment SharePoint Security Resource Kit

5 Lines of Defense You Need to Secure Your SharePoint Environment SharePoint Security Resource Kit SharePoint Security Playbook 5 Lines of Defense You Need to Secure Your SharePoint Environment Contents IT S TIME TO THINK ABOUT SHAREPOINT SECURITY Challenge 1: Ensure access rights remain aligned with

More information

Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education

Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education Cisco A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents

More information

Ninth Edition. David W. Cravens. Nigel F. Piercy. McGraw-frSiBI irwin. M.j. Neeley School of Business Texas Christian University

Ninth Edition. David W. Cravens. Nigel F. Piercy. McGraw-frSiBI irwin. M.j. Neeley School of Business Texas Christian University Ninth Edition David W. Cravens M.j. Neeley School of Business Texas Christian University Nigel F. Piercy Warwick Business School The University of Warwick McGraw-frSiBI irwin Boston Burr Ridge, IL Dubuque,

More information

Data Warehouse Design

Data Warehouse Design Data Warehouse Design Modern Principles and Methodologies Matteo Golfarelli Stefano Rizzi Translated by Claudio Pagliarani Mc Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City

More information

The Process. Improvement. Handbook. A Blueprint for Managing Change and. Increasing Organizational Performance. Tristan Boutros.

The Process. Improvement. Handbook. A Blueprint for Managing Change and. Increasing Organizational Performance. Tristan Boutros. The Process Improvement Handbook A Blueprint for Managing Change and Increasing Organizational Performance Tristan Boutros Tim Purdie Illustrations by Dustin Duffy Mc Graw Hill Education New York Chicago

More information

Web Protection for Your Business, Customers and Data

Web Protection for Your Business, Customers and Data WHITE PAPER: WEB PROTECTION FOR YOUR BUSINESS, CUSTOMERS............ AND.... DATA........................ Web Protection for Your Business, Customers and Data Who should read this paper For security decision

More information

Purchasing and Supply Chain Management

Purchasing and Supply Chain Management Eighth Edition Purchasing and Supply Chain Management KENNETH LYSONS MA, MEd, PhD, Dipl.PA, AcDip.Ed., DMS, FCIS, FCIPS, Flnst M, MILT BRIAN FARRINGTON BSc(Econ), MSc, PhD, FCIPS PEARSON Harlow, England

More information

CONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT

CONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT CONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT ABSTRACT Identity and access governance should be deployed across all types of users associated with an organization -- not just regular users

More information

How to Implement Lean Manufacturing

How to Implement Lean Manufacturing How to Implement Lean Manufacturing Lonnie Wilson Me Graw Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Contents Preface Acknowledgments

More information

INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION

INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION " - * INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION CHRIS PROSISE KEVIN MANDIA McGraw-Hill /Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul

More information

Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG

Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG Networking A Beginner's Guide Sixth Edition BRUCE HALLBERG Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents Acknowledgments

More information

Module 1: Introduction to Designing Security

Module 1: Introduction to Designing Security Module 1: Introduction to Designing Security Table of Contents Module Overview 1-1 Lesson 1: Overview of Designing Security for Microsoft Networks 1-2 Lesson 2: Introducing Contoso Pharmaceuticals: A Case

More information

Software Security. Building Security In. Gary McGraw. A Addison-Wesley

Software Security. Building Security In. Gary McGraw. A Addison-Wesley Software Security Building Security In Gary McGraw A Addison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal London Munich Paris Madrid Capetown Sydney Tokyo Singapore

More information

Securing the Cloud. Cloud Computer Security Techniques and Tactics. Vic (J.R.) Winkler. Technical Editor Bill Meine ELSEVIER

Securing the Cloud. Cloud Computer Security Techniques and Tactics. Vic (J.R.) Winkler. Technical Editor Bill Meine ELSEVIER Securing the Cloud Cloud Computer Security Techniques and Tactics Vic (J.R.) Winkler Technical Editor Bill Meine ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO

More information

SharePoint 2010. Overview, Governance, and Planning. (^Rll^^fc^ i ip?"^biifiis:'iissiipi. Scott Jamison. Susan Hanley Mauro Cardarelli.

SharePoint 2010. Overview, Governance, and Planning. (^Rll^^fc^ i ip?^biifiis:'iissiipi. Scott Jamison. Susan Hanley Mauro Cardarelli. Ec,V$%fMM SharePoint 2010 i ip?"^biifiis:'iissiipi Overview, Governance, (^Rll^^fc^ and Planning Ipft^'" Scott Jamison Susan Hanley Mauro Cardarelli Upper Saddle River, NJ Boston Indianapolis San Francisco

More information

Integration in Practice

Integration in Practice ORACLe Oracle Press Hudson Continuous Integration in Practice Ed Burns and Winston Prakash Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore

More information

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2. ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework

More information

Oracle Big Data Handbook

Oracle Big Data Handbook ORACLG Oracle Press Oracle Big Data Handbook Tom Plunkett Brian Macdonald Bruce Nelson Helen Sun Khader Mohiuddin Debra L. Harding David Segleau Gokula Mishra Mark F. Hornick Robert Stackowiak Keith Laker

More information

The webinar will begin shortly

The webinar will begin shortly The webinar will begin shortly An Introduction to Security Intelligence Presented by IBM Security Chris Ross Senior Security Specialist, IBM Security Agenda The Security Landscape An Introduction to Security

More information

Financial Times Prentice Hall is an imprint of

Financial Times Prentice Hall is an imprint of mnr\ Financial Times Prentice Hall is an imprint of Harlow, England London New York Boston San Francisco Toronto Sydney Singapore Hong Kong Tokyo Seoul Taipei New Delhi Cape Town Madrid Mexico City Amsterdam

More information

Relationship marketing

Relationship marketing Relationship marketing WBIbliothek Exploring relational strategies in marketing FOURTH EDITION JOHN EGAN London South Bank University Financial Times Prentice Hall is an imprint of Harlow, England London

More information

Fundamentals of Mobile and Pervasive Computing

Fundamentals of Mobile and Pervasive Computing Fundamentals of Mobile and Pervasive Computing Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert Technische Universitat Darmstadt FACHBEREICH INFORMATIK B1BLIOTHEK Inventar-Nr.:

More information

Top Digital Experts Share the. Formula for Tangible Returns. ort Vour Marketing Investment ERIC GREENBERG AND ALEXANDER KATES. Mc Graw Hill Education

Top Digital Experts Share the. Formula for Tangible Returns. ort Vour Marketing Investment ERIC GREENBERG AND ALEXANDER KATES. Mc Graw Hill Education STRATEGIC DIGITAL MARKETING Top Digital Experts Share the Formula for Tangible Returns ort Vour Marketing Investment ERIC GREENBERG AND ALEXANDER KATES Mc Graw Hill Education New York Chicago San Francisco

More information

PMP Project Management Professional Study Guide, Third Edition

PMP Project Management Professional Study Guide, Third Edition PMP Project Management Professional Study Guide, Third Edition Joseph Phillips McGraw-Hill is an independent entity from the Project Management Institute, Inc. and is not affiliated with the Project Management

More information

WHITE PAPER The Five Step Guide to Better Social Media Security

WHITE PAPER The Five Step Guide to Better Social Media Security WHITE PAPER The Five Step Guide to Better Social Media Security A Hootsuite White Paper The Five Step Guide to Better Social Media Security A Hootsuite White Paper In 2013, not a single month went by without

More information

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S& Building VPNs With IPSec and MPLS Nam-Kee Tan CCIE #4307 S& -.jr."..- i McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto

More information

IMPROVEMENT THE PRACTITIONER'S GUIDE TO DATA QUALITY DAVID LOSHIN

IMPROVEMENT THE PRACTITIONER'S GUIDE TO DATA QUALITY DAVID LOSHIN i I I I THE PRACTITIONER'S GUIDE TO DATA QUALITY IMPROVEMENT DAVID LOSHIN ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann

More information

James Dicks. 6 Ways to Trade the Dollar. McGraw-Hill

James Dicks. 6 Ways to Trade the Dollar. McGraw-Hill 2008 AGI-Information Management Consultants May be used for personal purporses only or by libraries associated to dandelon.com network. FOREX MADE EASY 6 Ways to Trade the Dollar James Dicks McGraw-Hill

More information

NEW ZEALAND FINANCIAL ACCOUNTING

NEW ZEALAND FINANCIAL ACCOUNTING J Q OOO####I i ' WWc #OOO####CI # «0O O0OQi###t i oi oo ###0 # i CRAIG DEEGAN / GRANT SAMKIN RMIT University University of Waikato NEW ZEALAND FINANCIAL ACCOUNTING The McGraw-Hill Companieii Sydney New

More information

INCIDENT RESPONSE CHECKLIST

INCIDENT RESPONSE CHECKLIST INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged

More information

Social Media. A brief overview of the Social Media module

Social Media. A brief overview of the Social Media module Social Media A brief overview of the Social Media module Title of Page to Appear Here in Arial Bold. Size: 32pt Line 1 of bullet point text to appear here in Arial regular. Size: 18pt Line 2 of bullet

More information

Customer Relationship. Management. Ed Peelen and Rob Beltman

Customer Relationship. Management. Ed Peelen and Rob Beltman Customer Relationship Management Ed Peelen and Rob Beltman PEARSON Harlow, England London New York Boston San Francisco Toronto Sydney Auckland Singapore Hong Kong Tokyo Seoul Taipei New Delhi Cape Town

More information

RFID Field Guide. Deploying Radio Frequency Identification Systems. Manish Bhuptani Shahram Moradpour. Sun Microsystems Press A Prentice Hall Title

RFID Field Guide. Deploying Radio Frequency Identification Systems. Manish Bhuptani Shahram Moradpour. Sun Microsystems Press A Prentice Hall Title RFID Field Guide Deploying Radio Frequency Identification Systems Manish Bhuptani Shahram Moradpour Sun Microsystems Press A Prentice Hall Title PRENTICE HALL PTR Prentice Hall Professional Technical Reference

More information

Search and Social. The Definitive Guide to Real-Time Content Marketing. Rob Garner. WILEY John Wiley & Sons, Inc.

Search and Social. The Definitive Guide to Real-Time Content Marketing. Rob Garner. WILEY John Wiley & Sons, Inc. Search and Social The Definitive Guide to Real-Time Content Marketing Rob Garner WILEY John Wiley & Sons, Inc. Contents Foreword xix Introduction t xxi Chapter 1 Real-Time Publishing and Marketing 1 Introduction

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

CAST Center for Advanced Security Training

CAST Center for Advanced Security Training CAST Center for Advanced Security Training Advanced Security Training (CAST) EC-Council s Center for Advanced Security Training (CAST) was created to address the need for highly technical and Advanced

More information

The PNC Financial Services Group, Inc. Business Continuity Program

The PNC Financial Services Group, Inc. Business Continuity Program The PNC Financial Services Group, Inc. Business Continuity Program subsidiaries) 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis

More information

Strengthen security with intelligent identity and access management

Strengthen security with intelligent identity and access management Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers

More information

SOCIAL MEDIA ANALYTICS AND TOOLS 101

SOCIAL MEDIA ANALYTICS AND TOOLS 101 SOCIAL MEDIA ANALYTICS AND TOOLS 101 Ken Paterson VP Research Operations/ Director, Credit Advisory Service kpaterson@mercatoradvisorygroup.com 8 Clock Tower Place, Suite 420 Maynard, MA 01754 phone: 1(781)

More information

A BUSINESS CASE FOR BEHAVIORAL ANALYTICS. White Paper

A BUSINESS CASE FOR BEHAVIORAL ANALYTICS. White Paper A BUSINESS CASE FOR BEHAVIORAL ANALYTICS White Paper Introduction What is Behavioral 1 In a world in which web applications and websites are becoming ever more diverse and complicated, running them effectively

More information

Measuring Data Quality for Ongoing Improvement

Measuring Data Quality for Ongoing Improvement Measuring Data Quality for Ongoing Improvement A Data Quality Assessment Framework Laura Sebastian-Coleman ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE

More information

C ONTENTS. Acknowledgments

C ONTENTS. Acknowledgments kincaidtoc.fm Page vii Friday, September 20, 2002 1:25 PM C ONTENTS Preface Acknowledgments xxi xxvii Part 1 CRM: Is It Right for Your Company? 1 Chapter 1 Commerce in the 21st Century 3 1.1 Understanding

More information

Goodbye Spokesperson, Hello Steward

Goodbye Spokesperson, Hello Steward Goodbye Spokesperson, Hello Steward The Transformation of Corporate Communications Once heralded as the seat held by the best storyteller in the company, corporate communications is no longer about amplifying

More information

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287

More information

MIKE COHN. Software Development Using Scrum. VAddison-Wesley. Upper Saddle River, NJ Boston Indianapolis San Francisco

MIKE COHN. Software Development Using Scrum. VAddison-Wesley. Upper Saddle River, NJ Boston Indianapolis San Francisco Software Development Using Scrum MIKE COHN VAddison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal London Munich Paris Madrid Cape Town Sydney Tokyo Singapore

More information

Iowa County Government Social Media Use Policy

Iowa County Government Social Media Use Policy Iowa County Government Social Media Use Policy This policy outlines appropriate use of social media, as it relates to Iowa County, by employees and departments for official and personal use. This policy

More information

ENTERPRISE RESOURCE PLANNING

ENTERPRISE RESOURCE PLANNING ENTERPRISE RESOURCE PLANNING ~SECOND E DITION~ ENTERPRISE RESOURCE PLANNING ~SECOND E DITION~ Alexis Leon L&L Consultancy Services Pvt Ltd Kochi Tata McGraw-Hill Publishing Company Limited NEW DELHI McGraw-Hill

More information

The PNC Financial Services Group, Inc. Business Continuity Program

The PNC Financial Services Group, Inc. Business Continuity Program The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page

More information

Measuring and. Communicating. Security's Value. A Compendium of Metrics. for Enterprise Protection

Measuring and. Communicating. Security's Value. A Compendium of Metrics. for Enterprise Protection Measuring and Communicating Security's Value A Compendium of Metrics for Enterprise Protection George Campbell AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE

More information

Forget the hype Ways to actually use Social Media to benefit your business

Forget the hype Ways to actually use Social Media to benefit your business Forget the hype Ways to actually use Social Media to benefit your business What is Social Media? Engaging with other businesses/individuals online + Effective Communication + Real-time Customer Support

More information

Manufacturing Planning and Control for Supply Chain Management

Manufacturing Planning and Control for Supply Chain Management Manufacturing Planning and Control for Supply Chain Management APICS/CPIM Certification Edition F. Robert Jacobs Indiana University William L. Berry The Ohio State University (Emeritus) D.ClayWhybark University

More information

Electric Power Distribution

Electric Power Distribution Electric Power Distribution A S Pabla Consulting Engineer and Former Chief Engineer Punjab State Electricity Board McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New

More information

Computing. Federal Cloud. Service Providers. The Definitive Guide for Cloud. Matthew Metheny ELSEVIER. Syngress is NEWYORK OXFORD PARIS SAN DIEGO

Computing. Federal Cloud. Service Providers. The Definitive Guide for Cloud. Matthew Metheny ELSEVIER. Syngress is NEWYORK OXFORD PARIS SAN DIEGO Federal Cloud Computing The Definitive Guide for Cloud Service Providers Matthew Metheny ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO

More information

Business resilience: The best defense is a good offense

Business resilience: The best defense is a good offense IBM Business Continuity and Resiliency Services January 2009 Business resilience: The best defense is a good offense Develop a best practices strategy using a tiered approach Page 2 Contents 2 Introduction

More information

CAREER DEVELOPMENT INTERVENTIONS IN THE 21 ST CENTURY

CAREER DEVELOPMENT INTERVENTIONS IN THE 21 ST CENTURY CAREER DEVELOPMENT INTERVENTIONS IN THE 21 ST CENTURY FOURTH EDITION SPENCER G. NILES Pennsylvania State University JOANN HARRIS-BOWLSBEY Kuder, Inc., Adel, Iowa PEARSON Boston Columbus Indianapolis New

More information

Comprehensive real-time protection against Advanced Threats and data theft

Comprehensive real-time protection against Advanced Threats and data theft TRITON AP-WEB Comprehensive real-time protection against Advanced Threats and data theft Your business and its data are under constant attack. Traditional security solutions no longer provide sufficient

More information

RFID in the Supply Chain

RFID in the Supply Chain RFID in the Supply Chain Pedro M. Reyes Me Gram/ Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Foreword Preface ix xi Part

More information

An Introduction. Global Edition. "University of North Carolina. Northwestern University

An Introduction. Global Edition. University of North Carolina. Northwestern University An Introduction Global Edition "University of North Carolina Northwestern University Boston Columbus Indianapolis NewYork San Francisco Upper Saddle River Amsterdam CapeTown Dubai London Madrid Milan Munich

More information

VALUATION The Art and Science of Corporate Investment Decisions

VALUATION The Art and Science of Corporate Investment Decisions VALUATION The Art and Science of Corporate Investment Decisions Second Edition SHERIDAN TITMAN University of Texas at Austin JOHN D. MARTIN Baylor University Prentice Hall Boston Columbus Indianapolis

More information

security changes with Orange focus on your business, we focus on your security

security changes with Orange focus on your business, we focus on your security security changes with Orange focus on your business, we focus on your security the only constant in security is change New uses and new technologies, proliferation of platforms and new workspaces in a

More information

Marketin. Global Edition 14

Marketin. Global Edition 14 Marketin Global Edition 14 PHILIP Kotler Northwestern University GARY Armstrong University of North Carolina Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai

More information