| 000 | 02514cam a2200349 i 4500 | ||
|---|---|---|---|
| 999 |
_c10603 _d10603 |
||
| 001 | 18264812 | ||
| 003 | OSt | ||
| 005 | 20190424132914.0 | ||
| 008 | 140812s2015 ne a 001 0 eng | ||
| 010 | _a 2014031130 | ||
| 020 | _a9780124200555 (paperback) | ||
| 040 |
_aDLC _beng _cDLC _erda _dDLC |
||
| 042 | _apcc | ||
| 050 | 0 | 0 |
_aTK5105.59 _b.G67 2015 |
| 082 | 0 | 0 |
_a005.8 _223 _bG.D.M |
| 100 | 1 | _aGonzalez, Deborah. | |
| 245 | 1 | 0 |
_aManaging online risk : _bapps, mobile, and social media security / _cDeborah Gonzalez. |
| 264 | 1 |
_aAmsterdam ; _aBoston : _bElsevier, Butterworth-Heinemann, _c[2015] |
|
| 300 |
_axiii, 271 pages : _billustrations ; _c24 cm |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 500 | _acomputer bookfair2016 | ||
| 505 | 8 | _aMachine generated contents note: Chapter 1: Risk Management, Data Style Chapter 2: Internal and External Risks Chapter 3: Reputation and Identity Chapter 4: The New Workforce Chapter 5: The Data Door Chapter 6: Approaches to Content Chapter 7: Compliance Chapter 8: Currency and Campaigns Chapter 9: Digital Succession Chapter 10: The Online Story Continues. | |
| 520 |
_a"In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online Risk presents the tools and resources needed to better understand the security and reputational risks of online and digital activity, and how to mitigate those risks to minimize potential losses. Managing Online Risk highlights security and risk management best practices that address concerns such as data collection and storage, liability, recruitment, employee communications, compliance violations, security of devices (in contexts like mobile, apps, and cloud computing), and more. Additionally, this book offers a companion website that was developed in parallel with the book and includes the latest updates and resources for topics covered in the book"-- _cProvided by publisher. |
||
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 0 |
_aInternet _xSecurity measures. |
|
| 856 |
_3Abstract _uhttp://repository.fue.edu.eg/xmlui/handle/123456789/3680 |
||
| 906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cBK |
||