Collaboration with cloud computing security, social media, and unified communications

Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examp...

Full description

Bibliographic Details
Main Author: Messier, Ric
Format: eBook
Language:English
Published: Waltham, MA Syngress 2014
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Table of Contents:
  • Front Cover; Collaboration with Cloud Computing; Copyright Page; Contents; Preface; Organization of this book; Intended audience; Acknowledgements; 1 The Evolving Nature of Information Security; Introduction; History of the Internet; Significant security events; Evolution of services; Today's risks (in a Nutshell); Collaboration; Conclusion; Summary; 2 Cloud Computing; Introduction; The protocols that made it possible; HTTP and HTML; XML; RESTful services; The cloud; Infrastructure as a service; Platform as a service; Software as a service; Storage; Unified communication as a service
  • Includes bibliographical references and index
  • IntroductionRisk management; Quantitative analysis; Return on investment; Social return on investment; Cost-benefit analysis; Qualitative assessment; Security policies; Legal and regulatory requirements; Controls; Conclusion; Summary; Further reading; 11 Future Technology; Introduction; Pushing into the cloud; Ubiquitous broadband; Wearable computing; Interfaces; HTML5; Consumers as producers; Conclusion; Summary; Further reading; 12 Pulling it All Together; Introduction; Background; Requirements; Messaging; Telephony; Storage; Human resources; Project management; Source control
  • ConclusionSummary; Further reading; 8 Unified Communications; Introduction; Signaling; H.323; Session initiation protocol; Network address translation; Unified communications; VoIP in the cloud; Security considerations; Conclusion; Summary; 9 Remote Workers; Introduction; Remote workers; Pros and cons of telecommuting; Management concerns and productivity; Antisocial behaviors; Cost savings; Communication challenges; Human resources and remote hires; Asynchronous versus synchronous; Security considerations; Conclusion; Summary; Further reading; 10 Risk Management and Policy Considerations
  • IntroductionHistory of virtualization; How virtualization works; Hypervisors; Snapshots; Platform as a service; Advantages of PaaS; Building a business; Security considerations; Conclusion; Summary; 6 Social Media; Introduction; History and impact of social networking; Social networking sites; Friendster; MySpace; Facebook; Twitter; Google+; Crowdsourcing; Gamification; Human resources; Security considerations; Conclusion; Summary; Further reading; 7 Mobile Computing; Introduction; Smartphones; Apps; Jailbreaking; Providing mobile access; Physical security; Bring your own device; Boundaries
  • Public, private, or hybridConclusion; Summary; 3 Software as a Service; Introduction; Contact lists; Documents on the go; Real-time editing; Geo-diverse teams; Agendas; Document sharing; Advantages; Security considerations; Conclusion; Summary; 4 Storage in the Cloud; Introduction; Uses of cloud storage; Collaboration; Large file transfer; Backups; Synchronization; Security; Privacy concerns; Safe Harbor; Data retention; Data destruction; Infrastructure; Protecting yourself; Encryption; Data loss prevention; Conclusion; Summary; Further reading; 5 Virtual Servers and Platform as a Service