Cargando…
How to Use Web 2.0 and Social Networking Sites Securely
Given the widespread use of Web 2.0 technologies and their impact in terms of the number and types of incidents and the cost of them, controlling Web 2.0 risks needs to be a high priority for all organisations. This pocket guide provides recommendations for organisations that will help them ensure t...
Autor principal: | Team, ITG Research |
---|---|
Lenguaje: | eng |
Publicado: |
IT Governance Publishing
2009
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1415421 |
Ejemplares similares
-
Threat 2.0: Security & Compliance for Web 2.0 sites
por: Team, ITG Research
Publicado: (2009) -
Securing the borderless network: security for the web 2.0 world
por: Gillis, Tom
Publicado: (2010) -
OAuth 2.0 cookbook: protect your web applications using Spring Security
por: Nascimento, Adolfo Eloy
Publicado: (2017) -
Security in a Web 2.0+ World: A Standards Based Approach
por: Solari , Carlos Curtis
Publicado: (2010) -
Internet and surveillance: the challenges of web 2.0 and social media
por: Fuchs, Christian
Publicado: (2012)