sponsored by Hewlett-Packard Company
Posted:  22 Apr 2013
Published:  31 May 2012
Format:  PDF
Length:  4  Page(s)
Type:  White Paper
Language:  English

While often considered fun entertainment, social networking sites are filled with predators and hackers who are observing, researching, and stalking intended victims.

This resource details the methods used to assist social networking sites in identifying online predators and thwarting potentially serious attacks. View now to learn more!

Hackers | Identity Management | Internet Security | Risk Management | Security | Security Management | Security Managers | Security Policies | Security Systems | Security Threats | Social Computing | Social Networking | Web Identities | Web Site Monitoring | Web Site Monitoring Software

View All Resources sponsored by Hewlett-Packard Company

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement