• Complain

Michael Cross - Social Media Security: Leveraging Social Networking While Mitigating Risk

Here you can read online Michael Cross - Social Media Security: Leveraging Social Networking While Mitigating Risk full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2013, publisher: Syngress, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Social Media Security: Leveraging Social Networking While Mitigating Risk
  • Author:
  • Publisher:
    Syngress
  • Genre:
  • Year:
    2013
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Social Media Security: Leveraging Social Networking While Mitigating Risk: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Social Media Security: Leveraging Social Networking While Mitigating Risk" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in peoples lives and is now becoming a significant driving force in business. These new platforms have provided new approaches to many critical enterprise functions, including identifying, communicating, and gathering feedback with customers (e.g., Facebook, Ning); locating expertise (e.g., LinkedIn); providing new communication platforms (e.g., Twitter); and collaborating with a community, small or large (e.g., wikis). However, many organizations have stayed away from potential benefits of social networks because of the significant risks associated with them. This book will help an organization understand the risks present in social networks and provide a framework covering policy, training and technology to address those concerns and mitigate the risks presented to leverage social media in their organization. The book also acknowledges that many organizations have already exposed themselves to more risk than they think from social networking and offers strategies for dialing it back to retake control.

  • Defines an organizations goals for social networking
  • Presents the risks present in social networking and how to mitigate them
  • Explains how to maintain continuous social networking security

Michael Cross: author's other books


Who wrote Social Media Security: Leveraging Social Networking While Mitigating Risk? Find out the surname, the name of the author of the book and a list of all author's works by series.

Social Media Security: Leveraging Social Networking While Mitigating Risk — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Social Media Security: Leveraging Social Networking While Mitigating Risk" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Social Media Security Leveraging Social Networking While Mitigating Risk - photo 1
Social Media Security
Leveraging Social Networking While Mitigating Risk

Michael Cross

Technical Editor

Rob Shimonski

Table of Contents Copyright Acquiring Editor Chris Katsaropoulos Editorial - photo 2

Table of Contents
Copyright

Acquiring Editor:Chris Katsaropoulos

Editorial Project Manager:Benjamin Rearick

Project Manager:Malathi Samayan

Designer:Matthew Limbert

Syngress is an imprint of Elsevier

225 Wyman Street, Waltham, MA 02451, USA

2014 Elsevier Inc. All rights reserved

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publishers permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.

This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).

Notices

Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods or professional practices, may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information or methods described here in. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.

To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.

Library of Congress Cataloging-in-Publication Data

Cross, Michael, 1965

Social media security: leveraging social networking while mitigating risk / Michael Cross.

pages cm

Includes bibliographical references and index.

ISBN 978-1-59749-986-6 (pbk.)

1. Social media--Security measures. 2. Online social networks--Security measures. 3. Risk management--Social aspects. 4. Computer security. I. Title.

HM742.C77 2013

005.8--dc23

2013036147

British Library Cataloguing-in-Publication Data

A catalogue record for this book is available from the British Library

For information on all Syngress publications, visit our website at store.elsevier.com/Syngress

ISBN: 978-1-59749-986-6

Printed and bound in the United States of America

14 15 16 13 12 11 10 9 8 7 6 5 4 3 2 1

Acknowledgements This book is gratefully dedicated to my wife and children who - photo 3

Acknowledgements

This book is gratefully dedicated to my wife and children, who were unbelievably supportive and helpful in making this possible. As I completed the chapters, my wife read them and provided the perspective of a reader who wants to know how to use social media effectively and securely. At the time this book comes out, my wife Jennifer and I will have been together 20 years. I love her as much today as when we first got together, and anyone who knows her can understand why.

We have three children that are full of ideas and dreams, and have no reservations in sharing them. Throughout this book, each of them showed their interests and individuality, and contributed their own suggestions. Sara at age 10 showed her compassion for others, offered insights into the concerns children have about cyberbullying and online harassment, and took interest reading the sections on those topics. Jason at age 8 showed his love of technology and how things work, but still managed to surprise me when he offered suggestions about adding information on hacking. Emily at age 7 shared her independence and thoughts on protecting others, proposing I add information on blocking users and sites. Rather than being upset about how little they saw me as I worked on the book, they found their own ways to become a part of it.

About the Author

Michael Cross is a SharePoint Administrator and Developer, and has worked in the areas of software development, Web design, hardware installation/repairs, database administration, graphic design, and network administration. Working for law enforcement, he is part of an Information Technology team that provides support to over 1000 civilian and uniformed users. His theory is that when the users carry guns, you tend to be more motivated in solving their problems.

Michael has a diverse background in technology. He was the first computer forensic analyst for a local police service, and performed digital forensic examinations on computers involved in criminal investigations. Over five years, he recovered and examined evidence involved in a wide range of crimes, inclusive to homicides, fraud, and possession of child pornography. In addition to this, he successfully tracked numerous individuals electronically, as in cases involving threatening email. He has consulted and assisted in numerous cases dealing with computer-related/Internet crimes and served as an expert witness on computers for criminal trials. In 2007, he was awarded a Police Commendation for the work he did in developing a system to track local high-risk offenders and sexual offenders.

With extensive experience in Web design and Internet-related technologies, Michael has created and maintained numerous Web sites and implementations of Microsoft SharePoint. This has included public Web sites, private ones on corporate intranets, and solutions that integrate them. In doing so, he has incorporated and promoted social networking features, created software to publish press releases online, and developed a wide variety of solutions that make it easier to get work done.

Michael has been a freelance writer and technical editor on over four dozen IT-related books, as well as writing material for other genres. He previously taught as an instructor and has written courseware for IT training courses. He has also made presentations on Internet safety, SharePoint, and other topics related to computers and the Internet. Despite his experience as a speaker, he still finds his wife wont listen to him.

Over the years, Michael has acquired a number of certifications from Microsoft, Novell, and CompTIA, including MCSE, MCP+I, CNA, and Network+. When he isnt writing or otherwise attached to a computer, he spends as much time as possible with the joys of his life: his lovely wife Jennifer, darling daughter Sara, adorable daughter Emily, and charming son Jason.

For the latest information on him, his projects, and a variety of other topics, you can follow him on Twitter @mybinarydreams, visit his Facebook page at www.facebook.com/mybinarydreams, follow him on LinkedIn at www.linkedin.com/in/mcross1, or read his blog at http://mybinarydreams.wordpress.com.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Social Media Security: Leveraging Social Networking While Mitigating Risk»

Look at similar books to Social Media Security: Leveraging Social Networking While Mitigating Risk. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Social Media Security: Leveraging Social Networking While Mitigating Risk»

Discussion, reviews of the book Social Media Security: Leveraging Social Networking While Mitigating Risk and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.