Collaboration with cloud computing security, social media, and unified communications

Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examp...

Full description

Bibliographic Details
Main Author: Messier, Ric
Format: eBook
Language:English
Published: Waltham, MA Syngress 2014
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 05283nmm a2200517 u 4500
001 EB001914251
003 EBX01000000000000001077153
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9780124171237 
020 |a 0124170404 
020 |a 0124171230 
050 4 |a QA76.9.A25 
100 1 |a Messier, Ric 
245 0 0 |a Collaboration with cloud computing  |b security, social media, and unified communications  |c Ric Messier ; technical editor, Allan Konar 
260 |a Waltham, MA  |b Syngress  |c 2014 
300 |a 1 volume  |b illustrations 
505 0 |a Front Cover; Collaboration with Cloud Computing; Copyright Page; Contents; Preface; Organization of this book; Intended audience; Acknowledgements; 1 The Evolving Nature of Information Security; Introduction; History of the Internet; Significant security events; Evolution of services; Today's risks (in a Nutshell); Collaboration; Conclusion; Summary; 2 Cloud Computing; Introduction; The protocols that made it possible; HTTP and HTML; XML; RESTful services; The cloud; Infrastructure as a service; Platform as a service; Software as a service; Storage; Unified communication as a service 
505 0 |a Includes bibliographical references and index 
505 0 |a IntroductionRisk management; Quantitative analysis; Return on investment; Social return on investment; Cost-benefit analysis; Qualitative assessment; Security policies; Legal and regulatory requirements; Controls; Conclusion; Summary; Further reading; 11 Future Technology; Introduction; Pushing into the cloud; Ubiquitous broadband; Wearable computing; Interfaces; HTML5; Consumers as producers; Conclusion; Summary; Further reading; 12 Pulling it All Together; Introduction; Background; Requirements; Messaging; Telephony; Storage; Human resources; Project management; Source control 
505 0 |a ConclusionSummary; Further reading; 8 Unified Communications; Introduction; Signaling; H.323; Session initiation protocol; Network address translation; Unified communications; VoIP in the cloud; Security considerations; Conclusion; Summary; 9 Remote Workers; Introduction; Remote workers; Pros and cons of telecommuting; Management concerns and productivity; Antisocial behaviors; Cost savings; Communication challenges; Human resources and remote hires; Asynchronous versus synchronous; Security considerations; Conclusion; Summary; Further reading; 10 Risk Management and Policy Considerations 
505 0 |a IntroductionHistory of virtualization; How virtualization works; Hypervisors; Snapshots; Platform as a service; Advantages of PaaS; Building a business; Security considerations; Conclusion; Summary; 6 Social Media; Introduction; History and impact of social networking; Social networking sites; Friendster; MySpace; Facebook; Twitter; Google+; Crowdsourcing; Gamification; Human resources; Security considerations; Conclusion; Summary; Further reading; 7 Mobile Computing; Introduction; Smartphones; Apps; Jailbreaking; Providing mobile access; Physical security; Bring your own device; Boundaries 
505 0 |a Public, private, or hybridConclusion; Summary; 3 Software as a Service; Introduction; Contact lists; Documents on the go; Real-time editing; Geo-diverse teams; Agendas; Document sharing; Advantages; Security considerations; Conclusion; Summary; 4 Storage in the Cloud; Introduction; Uses of cloud storage; Collaboration; Large file transfer; Backups; Synchronization; Security; Privacy concerns; Safe Harbor; Data retention; Data destruction; Infrastructure; Protecting yourself; Encryption; Data loss prevention; Conclusion; Summary; Further reading; 5 Virtual Servers and Platform as a Service 
653 |a Computer security 
653 |a Technologie de l'information / Gestion 
653 |a Information technology / Management / fast 
653 |a Sécurité informatique 
653 |a Cloud computing / fast 
653 |a Infonuagique 
653 |a Information technology / Security measures / fast 
653 |a Technologie de l'information / Sécurité / Mesures 
653 |a Cloud computing / http://id.loc.gov/authorities/subjects/sh2008004883 
653 |a Information technology / Security measures 
653 |a Computer crimes / Prevention 
653 |a Information technology / Management / http://id.loc.gov/authorities/subjects/sh2008006980 
653 |a Computer security / fast 
653 |a Computer crimes / Prevention / fast 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
776 |z 9780124170407 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780124170407/?ar  |x Verlag  |3 Volltext 
082 0 |a 658 
082 0 |a 305.8 
082 0 |a 364.1 
520 |a Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses: The evolving nature of information securityThe risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise T.