How to Use Web 2.0 & Threat 2.0 - 2 Pocket Guides
Course
Online
Description
-
Type
Course
-
Methodology
Online
-
Start date
Different dates available
This is the downloadable version of our special pack of our two new pocket guides which provides organisations with core guidance on how to ensure that their websites remain secure - and comply with the rapidly evolving regulatory requirements that cover personal data and computer security.List Price:£39.90 GBP
Facilities
Location
Start date
Start date
Reviews
Subjects
- IT
- Web
- Web 2.0
- IT Security
- Security
- Computer Security
Course programme
This is the downloadable version of our special pack of our two new pocket guides which provides organisations with core guidance on how to ensure that their websites remain secure - and comply with the rapidly evolving regulatory requirements that cover personal data and computer security.List Price:£39.90 GBP
Program
ORDER THIS COMPLETE SET OF TWO POCKET GUIDES WHICH PROVIDE CORE GUIDANCE ON THREAT 2.0 AND SAVE OVER £9 TODAY!
This set of pocket guides is also available in a soft cover format here.
Web 2.0 - a widespread series of developments in the way websites are designed and accessed, and more widely known as 'social networking sites' - is a new and exciting way for websites to work. The extent to which Web 2.0 sites (such as Wikipedia, FaceBook, and YouTube) also rely on user-generated content adds to their immediacy, excitement and relevance.
Web 2.0 sites do, however, come with their own set of risks - risks to users, to their confidential information, and to associated parties. It is not unusual, when technology is evolving so quickly, and is subject to such rapid take up, for such security risks to be bypassed - to the detriment of users.
This set includes:
Threat 2.0: Security and compliance for Web 2.0 sites (Download) - this book is probably the first book on this subject to be published; it has its origins in the detailed research which we did into Web 2.0: Trends, Benefits and Risks during Autumn 2008 and provides organisations with core guidance on how to ensure that their websites remain secure - and comply with the rapidly evolving regulatory requirements that cover personal data and computer security.
Key features of this guide include:
- Benefits and risks of Web 2.0 technologies
- Making Web 2.0 sites secure
- Ensuring Web 2.0 sites are compliant
Key features include:
- Web 2.0 threats - phishing, hacking attacks, social engineering...
- Protecting organisations from risks including introducting policies and staff awareness training
How to Use Web 2.0 & Threat 2.0 - 2 Pocket Guides