Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    ISBN: 9780124170407
    Language: English
    Pages: XIX, 222 S. , zahlr. Ill.
    DDC: 305.8
    RVK:
    Keywords: Information technology Security measures ; Information technology Management ; Cloud computing ; Computer security ; Computer crimes Prevention ; Cloud Computing ; Möglichkeit ; Risiko
    Abstract: "It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of the activities"--
    Description / Table of Contents: Machine generated contents note: 1. The Evolving Nature of Information Management Security 2. Cloud Computing 3. Software as a Service 4. Storage in the Cloud 5. Virtual Servers and Platform as a Service 6. Social Media 7. Mobile Computing 8. Unified Communications 9. Remote Workers 10. Risk Management and Policy Considerations 11. Future Technology 12. Pulling it all Together
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media
    ISBN: 9781491957875 , 1491957875
    Language: English
    Pages: 1 online resource (1 streaming video file (34 hr., 48 min.)) , digital, sound, color
    Keywords: Internet videos ; Streaming video ; Computer security ; Hacking ; Computer crimes ; Investigation ; Cloud computing ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Abstract: "If you share resources across your network or the cloud, you need a firm grasp of all of the security implications. In this Learning Path, you'll get hands-on experience securing your infrastructure while learning about risk assessment and management, sensitive data, computer forensics, penetration testing, and much more. By the end of this course, you'll know how to secure your data and keep it that way."--Resource description page.
    Note: Title and publication information from resource description page (Safari, viewed March 16, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780124171237
    Language: English
    Pages: 1 online resource (243 pages)
    Parallel Title: Erscheint auch als
    DDC: 305.8
    Keywords: Information technology -- Security measures ; Information technology -- Management ; Cloud computing ; Computer security ; Computer crimes -- Prevention ; Cloud computing ; Computer crimes ; Prevention ; Computer security ; Information technology ; Management ; Information technology ; Security measures ; Electronic books
    Abstract: Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses: The evolving nature of information security The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise The risks and rewards of allowing remote connectivity and accessibility to the enterprise network Discusses the risks associated with technologies such as social media, voice over IP (VoIP) and cloud computing and provides guidance on how to manage that risk through policy changes and technical solutions Presents a detailed look at the risks and rewards associated with cloud computing and storage as well as software as a service (SaaS) and includes pertinent case studies Explores the risks associated with the use of social media to the enterprise network Covers the bring-your-own-device (BYOD) trend, including policy considerations and technical requirements.
    Abstract: Front Cover -- Collaboration with Cloud Computing -- Copyright Page -- Contents -- Preface -- Intended audience -- Organization of this book -- Acknowledgements -- 1 The Evolving Nature of Information Security -- Introduction -- History of the Internet -- Significant security events -- Evolution of services -- Today's risks (in a Nutshell) -- Collaboration -- Conclusion -- Summary -- 2 Cloud Computing -- Introduction -- The protocols that made it possible -- HTTP and HTML -- XML -- RESTful services -- The cloud -- Infrastructure as a service -- Platform as a service -- Software as a service -- Storage -- Unified communication as a service -- Public, private, or hybrid -- Conclusion -- Summary -- 3 Software as a Service -- Introduction -- Contact lists -- Documents on the go -- Real-time editing -- Geo-diverse teams -- Agendas -- Document sharing -- Advantages -- Security considerations -- Conclusion -- Summary -- 4 Storage in the Cloud -- Introduction -- Uses of cloud storage -- Collaboration -- Large file transfer -- Backups -- Synchronization -- Security -- Privacy concerns -- Safe Harbor -- Data retention -- Data destruction -- Infrastructure -- Protecting yourself -- Encryption -- Data loss prevention -- Conclusion -- Summary -- Further reading -- 5 Virtual Servers and Platform as a Service -- Introduction -- History of virtualization -- How virtualization works -- Hypervisors -- Snapshots -- Platform as a service -- Advantages of PaaS -- Building a business -- Security considerations -- Conclusion -- Summary -- 6 Social Media -- Introduction -- History and impact of social networking -- Social networking sites -- Friendster -- MySpace -- Facebook -- Twitter -- Google+ -- Crowdsourcing -- Gamification -- Human resources -- Security considerations -- Conclusion -- Summary -- Further reading -- 7 Mobile Computing -- Introduction -- Smartphones.
    Note: Description based on publisher supplied metadata and other sources
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Waltham, Massachusetts : Syngress
    ISBN: 9780124171237 , 9780124170407
    Language: English
    Pages: Online-Ressource (1 online resource (243 pages)) , illustrations
    Edition: Online-Ausg.
    DDC: 305.8
    Keywords: Information technology Security measures ; Information technology Management ; Cloud computing ; Computer security ; Computer crimes Prevention ; Electronic books
    Note: Includes bibliographical references at the end of each chapters and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9780124171237 , 0124171230
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Information technology ; Security measures ; Information technology ; Management ; Cloud computing ; Computer security ; Computer crimes ; Prevention ; Electronic books ; local ; Electronic books
    Abstract: Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses: The evolving nature of information security The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise The risks and rewards of allowing remote connectivity and accessibility to the enterprise network Discusses the risks associated with technologies such as social media, voice over IP (VoIP) and cloud computing and provides guidance on how to manage that risk through policy changes and technical solutions Presents a detailed look at the risks and rewards associated with cloud computing and storage as well as software as a service (SaaS) and includes pertinent case studies Explores the risks associated with the use of social media to the enterprise network Covers the bring-your-own-device (BYOD) trend, including policy considerations and technical requirements
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...