Muutke küpsiste eelistusi

E-raamat: Collaboration with Cloud Computing: Security, Social Media, and Unified Communications

(GSEC, CEH, CISSP, WasHere Consulting, Instructor, Graduate Professional Studies, Brandeis University and Champlain College Division of Information Technology & Sciences)
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 07-Apr-2014
  • Kirjastus: Syngress Media,U.S.
  • Keel: eng
  • ISBN-13: 9780124171237
  • Formaat - EPUB+DRM
  • Hind: 42,30 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 07-Apr-2014
  • Kirjastus: Syngress Media,U.S.
  • Keel: eng
  • ISBN-13: 9780124171237

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

"It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of theactivities"--

As more and more business functions move to cloud computing service, the need for and advantages of collaboration using cloud computing have become a major factor in organizational planning. Of interest to mangers of all levels and divisions of an organization, this book gives an overview of collaborative cloud based services. Messier, a security consultant, looks at how businesses can use these cloud services effectively to boost their productivity without jeopardizing the security of their data. The author looks at the various types of collaborative cloud services employees can use to free themselves of geographic constraints to work together. From social media and cloud based storage to remote sessions and virtual servers, these new collaborative services allow employees to work on the same project from thousands of miles away. Messier shows how these remote services can be just as secure and safe to use as traditional in-house services. Annotation ©2014 Ringgold, Inc., Portland, OR (protoview.com)

Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions.

Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses:

  • The evolving nature of information security
  • The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP
  • Social media and security risks in the enterprise
  • The risks and rewards of allowing remote connectivity and accessibility to the enterprise network
  • Discusses the risks associated with technologies such as social media, voice over IP (VoIP) and cloud computing and provides guidance on how to manage that risk through policy changes and technical solutions
  • Presents a detailed look at the risks and rewards associated with cloud computing and storage as well as software as a service (SaaS) and includes pertinent case studies
  • Explores the risks associated with the use of social media to the enterprise network
  • Covers the bring-your-own-device (BYOD) trend, including policy considerations and technical requirements

Muu info

Understand the risks, rewards, and security considerations when implementing SaaS, cloud computing, and VoIP.
Preface xiii
Acknowledgements xix
Chapter 1 The Evolving Nature of Information Security
1(14)
Introduction
1(1)
History of the Internet
2(1)
Significant security events
2(3)
Evolution of services
5(3)
Today's risks (in a Nutshell)
8(4)
Collaboration
12(1)
Conclusion
13(2)
Summary
13(2)
Chapter 2 Cloud Computing
15(18)
Introduction
15(1)
The protocols that made it possible
16(5)
HTTP and HTML
17(1)
XML
18(1)
RESTful services
19(2)
The cloud
21(7)
Infrastructure as a service
24(1)
Platform as a service
25(2)
Software as a service
27(1)
Storage
28(1)
Unified communication as a service
28(1)
Public, private, or hybrid
29(1)
Conclusion
30(3)
Summary
32(1)
Chapter 3 Software as a Service
33(24)
Introduction
33(1)
Contact lists
34(7)
Documents on the go
41(7)
Real-time editing
46(1)
Geo-diverse teams
47(1)
Agendas
47(1)
Document sharing
48(1)
Advantages
48(3)
Security considerations
51(3)
Conclusion
54(3)
Summary
55(2)
Chapter 4 Storage in the Cloud
57(20)
Introduction
57(1)
Uses of cloud storage
58(3)
Collaboration
58(1)
Large file transfer
59(1)
Backups
60(1)
Synchronization
60(1)
Security
61(7)
Privacy concerns
61(5)
Data retention
66(2)
Data destruction
68(1)
Infrastructure
68(1)
Protecting yourself
68(5)
Encryption
70(2)
Data loss prevention
72(1)
Conclusion
73(2)
Summary
74(1)
Further reading
75(2)
Chapter 5 Virtual Servers and Platform as a Service
77(16)
Introduction
77(1)
History of virtualization
78(3)
How virtualization works
81(3)
Hypervisors
82(1)
Snapshots
83(1)
Platform as a service
84(5)
Advantages of PaaS
86(2)
Building a business
88(1)
Security considerations
89(1)
Conclusion
90(3)
Summary
91(2)
Chapter 6 Social Media
93(22)
Introduction
93(1)
History and impact of social networking
94(3)
Social networking sites
97(10)
Friendster
98(1)
MySpace
99(1)
Facebook
99(4)
Twitter
103(4)
Google+
107(1)
Crowdsourcing
107(2)
Gamification
109(1)
Human resources
110(1)
Security considerations
111(1)
Conclusion
112(1)
Summary
113(1)
Further reading
113(2)
Chapter 7 Mobile Computing
115(20)
Introduction
115(1)
Smartphones
116(8)
Apps
119(3)
Jailbreaking
122(2)
Providing mobile access
124(1)
Physical security
125(4)
Bring your own device
129(3)
Boundaries
131(1)
Conclusion
132(1)
Summary
133(1)
Further reading
133(2)
Chapter 8 Unified Communications
135(20)
Introduction
135(2)
Signaling
137(2)
H.323
139(5)
Session initiation protocol
144(5)
Network address translation
148(1)
Unified communications
149(1)
VoIP in the cloud
150(2)
Security considerations
152(1)
Conclusion
153(2)
Summary
154(1)
Chapter 9 Remote Workers
155(14)
Introduction
155(1)
Remote workers
156(3)
Pros and cons of telecommuting
159(5)
Management concerns and productivity
159(1)
Antisocial behaviors
160(1)
Cost savings
161(1)
Communication challenges
162(1)
Human resources and remote hires
163(1)
Asynchronous versus synchronous
164(1)
Security considerations
165(2)
Conclusion
167(1)
Summary
167(1)
Further reading
167(2)
Chapter 10 Risk Management and Policy Considerations
169(16)
Introduction
169(1)
Risk management
170(9)
Quantitative analysis
173(2)
Return on investment
175(1)
Social return on investment
176(1)
Cost--benefit analysis
177(1)
Qualitative assessment
178(1)
Security policies
179(4)
Legal and regulatory requirements
181(1)
Controls
182(1)
Conclusion
183(1)
Summary
183(1)
Further reading
184(1)
Chapter 11 Future Technology
185(14)
Introduction
185(1)
Pushing into the cloud
185(2)
Ubiquitous broadband
187(2)
Wearable computing
189(4)
Interfaces
193(1)
HTML5
194(2)
Consumers as producers
196(1)
Conclusion
197(1)
Summary
198(1)
Further reading
198(1)
Chapter 12 Pulling It All Together
199(18)
Introduction
199(1)
Background
200(1)
Requirements
201(1)
Messaging
202(8)
Telephony
208(2)
Storage
210(3)
Human resources
212(1)
Project management
213(1)
Source control
214(1)
Customer relations
215(1)
Conclusion
215(2)
Summary
216(1)
Index 217
GSEC, CEH, CISSP, WasHere Consulting, Instructor, Graduate Professional Studies, Brandeis University and Champlain College Division of Information Technology & Sciences