Collaboration with cloud computing : (Record no. 25012)

LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2014003523
INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780124170407
DEWEY DECIMAL CLASSIFICATION NUMBER
Call number 305.8
MAIN ENTRY--PERSONAL NAME
Authors Messier, Ric.
TITLE STATEMENT
Title Collaboration with cloud computing :
Subtitle security, social media, and unified communications /
Statement of responsibility, etc Ric Messier ; AllanKonar, Techical Editor.
PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Amsterdam ; Boston :
Publisher Syngress,
Date 2014.
PHYSICAL DESCRIPTION
Extent xix, 222 p. :
Other Details ill. ;
Size 24 cm.
CONTENTS
Contents Machine generated contents note: 1. The Evolving Nature of Information Management Security 2. Cloud Computing 3. Software as a Service 4. Storage in the Cloud 5. Virtual Servers 6. Social Media Risks & Rewards 7. VOIP and Its Risks 8. The Risks and Rewards of Remote Workers 9. Policy Considerations 10. Risk Management 11. New Technologies and Being Agile 12. Future Trends and Outcomes.
SUMMARY
Summary Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses: The evolving nature of information security The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise The risks and rewards of allowing remote connectivity and accessibility to the enterprise network Discusses the risks associated with technologies such as social media, voice over IP (VoIP) and cloud computing and provides guidance on how to manage that risk through policy changes and technical solutions Presents a detailed look at the risks and rewards associated with cloud computing and storage as well as software as a service (SaaS) and includes pertinent case studies Explores the risks associated with the use of social media to the enterprise network Covers the bring-your-own-device (BYOD) trend, including policy considerations and technical requirements.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Information technology
General Security measures.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Information technology
General Management.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Cloud computing.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Computer security.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Heading Computer crimes
General Prevention.
ADDED ENTRY
Name Konar, Allan.,
Role Technical Editor.
ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://uowd.box.com/s/awqkbckqx30dvedoyetvm3olrhf6uzdp
Public note Location Map
MAIN ENTRY--PERSONAL NAME
-- 37411
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 14841
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 1798
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 5120
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 641
SUBJECT ADDED ENTRY--TOPICAL TERM
-- 18414
ADDED ENTRY
-- 37412
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Shelving location Date acquired Source of acquisition Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type
        University of Wollongong in Dubai University of Wollongong in Dubai Main Collection 2014-10-26 MERIC 004.6782 ME CO T0012824 2017-01-26 189.00 2017-01-26 REGULAR

Powered by Koha