Book description
Optimise your Web 2.0 and Social networking efforts, whilst managing risk and information security ... this essential guide will show you how!
Table of contents
- Foreword
- Chapter 1: Web 2.0
- Chapter 2: The Threat Landscape
- Chapter 3: Making Web 2.0 Sites Secure
-
Chapter 4: Ensuring Web 2.0 Sites are Compliant
- UK
- US
- Europe
- Canada
- Copyright and Intellectual property infringement
- PCI
- Protection against breach of confidentiality and reputation damage
- Privacy (1/3)
- Privacy (2/3)
- Privacy (3/3)
- Processing of personal data – data protection and data breach notification (1/2)
- Processing of personal data – data protection and data breach notification (2/2)
- Chapter 5: Summary of Recommendations
- Chapter 6: Conclusion
- Appendix: Glossary (1/3)
- Appendix: Glossary (2/3)
- Appendix: Glossary (3/3)
- ITG Resources
Product information
- Title: Threat 2.0: Security and compliance for Web 2.0 sites
- Author(s):
- Release date: January 2009
- Publisher(s): IT Governance Publishing
- ISBN: 9781849280105
You might also like
book
Information Security Law: The Emerging Standard for Corporate Compliance
Information Security Law: The Emerging Standard for Corporate Compliance is designed to help companies understand this …
book
Deploying Raspberry Pi in the Classroom
Learn how to deploy Raspberry Pi computers in a classroom or lab situation and how to …
book
Raspberry Pi 2 Server Essentials
Transform your Raspberry Pi into a multi-purpose web server that supports your entire multimedia world with …
book
Raspberry Pi for Secret Agents - Third Edition
Turn your Raspberry Pi into a secret agent toolbox with this set of exciting projects About …