Collaboration with cloud computing security, social media, and unified communications

Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous e...

Descripción completa

Detalles Bibliográficos
Otros Autores: Messier, Ric, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Waltham, Massachusetts : Syngress 2014.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629384406719
Tabla de Contenidos:
  • Front Cover; Collaboration with Cloud Computing; Copyright Page; Contents; Preface; Organization of this book; Intended audience; Acknowledgements; 1 The Evolving Nature of Information Security; Introduction; History of the Internet; Significant security events; Evolution of services; Today's risks (in a Nutshell); Collaboration; Conclusion; Summary; 2 Cloud Computing; Introduction; The protocols that made it possible; HTTP and HTML; XML; RESTful services; The cloud; Infrastructure as a service; Platform as a service; Software as a service; Storage; Unified communication as a service
  • Public, private, or hybridConclusion; Summary; 3 Software as a Service; Introduction; Contact lists; Documents on the go; Real-time editing; Geo-diverse teams; Agendas; Document sharing; Advantages; Security considerations; Conclusion; Summary; 4 Storage in the Cloud; Introduction; Uses of cloud storage; Collaboration; Large file transfer; Backups; Synchronization; Security; Privacy concerns; Safe Harbor; Data retention; Data destruction; Infrastructure; Protecting yourself; Encryption; Data loss prevention; Conclusion; Summary; Further reading; 5 Virtual Servers and Platform as a Service
  • IntroductionHistory of virtualization; How virtualization works; Hypervisors; Snapshots; Platform as a service; Advantages of PaaS; Building a business; Security considerations; Conclusion; Summary; 6 Social Media; Introduction; History and impact of social networking; Social networking sites; Friendster; MySpace; Facebook; Twitter; Google+; Crowdsourcing; Gamification; Human resources; Security considerations; Conclusion; Summary; Further reading; 7 Mobile Computing; Introduction; Smartphones; Apps; Jailbreaking; Providing mobile access; Physical security; Bring your own device; Boundaries
  • ConclusionSummary; Further reading; 8 Unified Communications; Introduction; Signaling; H.323; Session initiation protocol; Network address translation; Unified communications; VoIP in the cloud; Security considerations; Conclusion; Summary; 9 Remote Workers; Introduction; Remote workers; Pros and cons of telecommuting; Management concerns and productivity; Antisocial behaviors; Cost savings; Communication challenges; Human resources and remote hires; Asynchronous versus synchronous; Security considerations; Conclusion; Summary; Further reading; 10 Risk Management and Policy Considerations
  • IntroductionRisk management; Quantitative analysis; Return on investment; Social return on investment; Cost-benefit analysis; Qualitative assessment; Security policies; Legal and regulatory requirements; Controls; Conclusion; Summary; Further reading; 11 Future Technology; Introduction; Pushing into the cloud; Ubiquitous broadband; Wearable computing; Interfaces; HTML5; Consumers as producers; Conclusion; Summary; Further reading; 12 Pulling it All Together; Introduction; Background; Requirements; Messaging; Telephony; Storage; Human resources; Project management; Source control
  • Customer relations