<p><i>Collaboration with Cloud Computing </i>discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. </p> <p>Drawing upon years of practical experience and us
Collaboration with Cloud Computing: Security, Social Media, and Unified Communications
β Scribed by Ric Messier
- Publisher
- Syngress
- Year
- 2014
- Tongue
- English
- Leaves
- 243
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions.
Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses:
- The evolving nature of information security
- The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP
- Social media and security risks in the enterprise
- The risks and rewards of allowing remote connectivity and accessibility to the enterprise network
β¦ Table of Contents
Front Cover
Collaboration with Cloud Computing
Copyright Page
Contents
Preface
Intended audience
Organization of this book
Acknowledgements
1 The Evolving Nature of Information Security
Introduction
History of the Internet
Significant security events
Evolution of services
Todayβs risks (in a Nutshell)
Collaboration
Conclusion
Summary
2 Cloud Computing
Introduction
The protocols that made it possible
HTTP and HTML
XML
RESTful services
The cloud
Infrastructure as a service
Platform as a service
Software as a service
Storage
Unified communication as a service
Public, private, or hybrid
Conclusion
Summary
3 Software as a Service
Introduction
Contact lists
Documents on the go
Real-time editing
Geo-diverse teams
Agendas
Document sharing
Advantages
Security considerations
Conclusion
Summary
4 Storage in the Cloud
Introduction
Uses of cloud storage
Collaboration
Large file transfer
Backups
Synchronization
Security
Privacy concerns
Safe Harbor
Data retention
Data destruction
Infrastructure
Protecting yourself
Encryption
Data loss prevention
Conclusion
Summary
Further reading
5 Virtual Servers and Platform as a Service
Introduction
History of virtualization
How virtualization works
Hypervisors
Snapshots
Platform as a service
Advantages of PaaS
Building a business
Security considerations
Conclusion
Summary
6 Social Media
Introduction
History and impact of social networking
Social networking sites
Friendster
MySpace
Facebook
Twitter
Google+
Crowdsourcing
Gamification
Human resources
Security considerations
Conclusion
Summary
Further reading
7 Mobile Computing
Introduction
Smartphones
Apps
Jailbreaking
Providing mobile access
Physical security
Bring your own device
Boundaries
Conclusion
Summary
Further reading
8 Unified Communications
Introduction
Signaling
H.323
Session initiation protocol
Network address translation
Unified communications
VoIP in the cloud
Security considerations
Conclusion
Summary
9 Remote Workers
Introduction
Remote workers
Pros and cons of telecommuting
Management concerns and productivity
Antisocial behaviors
Cost savings
Communication challenges
Human resources and remote hires
Asynchronous versus synchronous
Security considerations
Conclusion
Summary
Further reading
10 Risk Management and Policy Considerations
Introduction
Risk management
Quantitative analysis
Return on investment
Social return on investment
Costβbenefit analysis
Qualitative assessment
Security policies
Legal and regulatory requirements
Controls
Conclusion
Summary
Further reading
11 Future Technology
Introduction
Pushing into the cloud
Ubiquitous broadband
Wearable computing
Interfaces
HTML5
Consumers as producers
Conclusion
Summary
Further reading
12 Pulling it All Together
Introduction
Background
Requirements
Messaging
Telephony
Storage
Human resources
Project management
Source control
Customer relations
Conclusion
Summary
Index
π SIMILAR VOLUMES
Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examp
<p><span>Joining a thriving field of new media, this collective volume authored by global academics features important research by thought leaders within computer-mediated communication</span><span>(CMC) and social media. Featuring 40 comprehensive chapters of new research that focuses on what is ne
<p><span>Joining a thriving field of new media, this collective volume authored by global academics features important research by thought leaders within computer-mediated communication</span><span>(CMC) and social media. Featuring 40 comprehensive chapters of new research that focuses on what is ne
Social media holds potential benefits for schools reaching out to our communities, preparing our teachers, and connecting with our kids. In this short text, the authors examine how enterprising K-8 schools are using social media tools to provide customized professional development for teachers. They