𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Collaboration with Cloud Computing: Security, Social Media, and Unified Communications

✍ Scribed by Ric Messier


Publisher
Syngress
Year
2014
Tongue
English
Leaves
243
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions.

Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses:

  • The evolving nature of information security
  • The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP
  • Social media and security risks in the enterprise
  • The risks and rewards of allowing remote connectivity and accessibility to the enterprise network

✦ Table of Contents


Front Cover
Collaboration with Cloud Computing
Copyright Page
Contents
Preface
Intended audience
Organization of this book
Acknowledgements
1 The Evolving Nature of Information Security
Introduction
History of the Internet
Significant security events
Evolution of services
Today’s risks (in a Nutshell)
Collaboration
Conclusion
Summary
2 Cloud Computing
Introduction
The protocols that made it possible
HTTP and HTML
XML
RESTful services
The cloud
Infrastructure as a service
Platform as a service
Software as a service
Storage
Unified communication as a service
Public, private, or hybrid
Conclusion
Summary
3 Software as a Service
Introduction
Contact lists
Documents on the go
Real-time editing
Geo-diverse teams
Agendas
Document sharing
Advantages
Security considerations
Conclusion
Summary
4 Storage in the Cloud
Introduction
Uses of cloud storage
Collaboration
Large file transfer
Backups
Synchronization
Security
Privacy concerns
Safe Harbor
Data retention
Data destruction
Infrastructure
Protecting yourself
Encryption
Data loss prevention
Conclusion
Summary
Further reading
5 Virtual Servers and Platform as a Service
Introduction
History of virtualization
How virtualization works
Hypervisors
Snapshots
Platform as a service
Advantages of PaaS
Building a business
Security considerations
Conclusion
Summary
6 Social Media
Introduction
History and impact of social networking
Social networking sites
Friendster
MySpace
Facebook
Twitter
Google+
Crowdsourcing
Gamification
Human resources
Security considerations
Conclusion
Summary
Further reading
7 Mobile Computing
Introduction
Smartphones
Apps
Jailbreaking
Providing mobile access
Physical security
Bring your own device
Boundaries
Conclusion
Summary
Further reading
8 Unified Communications
Introduction
Signaling
H.323
Session initiation protocol
Network address translation
Unified communications
VoIP in the cloud
Security considerations
Conclusion
Summary
9 Remote Workers
Introduction
Remote workers
Pros and cons of telecommuting
Management concerns and productivity
Antisocial behaviors
Cost savings
Communication challenges
Human resources and remote hires
Asynchronous versus synchronous
Security considerations
Conclusion
Summary
Further reading
10 Risk Management and Policy Considerations
Introduction
Risk management
Quantitative analysis
Return on investment
Social return on investment
Cost–benefit analysis
Qualitative assessment
Security policies
Legal and regulatory requirements
Controls
Conclusion
Summary
Further reading
11 Future Technology
Introduction
Pushing into the cloud
Ubiquitous broadband
Wearable computing
Interfaces
HTML5
Consumers as producers
Conclusion
Summary
Further reading
12 Pulling it All Together
Introduction
Background
Requirements
Messaging
Telephony
Storage
Human resources
Project management
Source control
Customer relations
Conclusion
Summary
Index


πŸ“œ SIMILAR VOLUMES


Collaboration with Cloud Computing. Secu
✍ Ric Messier (Auth.) πŸ“‚ Library πŸ“… 2014 πŸ› Syngress 🌐 English

<p><i>Collaboration with Cloud Computing </i>discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. </p> <p>Drawing upon years of practical experience and us

Collaboration with Cloud Computing Secu
✍ Ric Messier πŸ“‚ Library πŸ“… 2014 πŸ› Syngress 🌐 English

Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examp

The Emerald Handbook of Computer-Mediate
✍ Jeremy Harris Lipschultz (editor), Karen Freberg (editor), Regina Luttrell (edit πŸ“‚ Library πŸ“… 2022 πŸ› Emerald Publishing Limited 🌐 English

<p><span>Joining a thriving field of new media, this collective volume authored by global academics features important research by thought leaders within computer-mediated communication</span><span>(CMC) and social media. Featuring 40 comprehensive chapters of new research that focuses on what is ne

The Emerald Handbook of Computer-Mediate
✍ Jeremy Harris Lipschultz (editor), Karen Freberg (editor), Regina Luttrell (edit πŸ“‚ Library πŸ“… 2022 πŸ› Emerald Publishing Limited 🌐 English

<p><span>Joining a thriving field of new media, this collective volume authored by global academics features important research by thought leaders within computer-mediated communication</span><span>(CMC) and social media. Featuring 40 comprehensive chapters of new research that focuses on what is ne

Communicating and Connecting With Social
✍ William M. Ferriter; Jason T. Ramsden πŸ“‚ Library πŸ“… 2012 πŸ› Solution Tree Press 🌐 English

Social media holds potential benefits for schools reaching out to our communities, preparing our teachers, and connecting with our kids. In this short text, the authors examine how enterprising K-8 schools are using social media tools to provide customized professional development for teachers. They