Collaboration with cloud computing: security, social media, and unified communications
"It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down wh...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Amsterdam [u.a.]
Elsevier Syngress
2014
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of the activities"-- |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XIX, 222 S. Ill. |
ISBN: | 9780124170407 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV041953472 | ||
003 | DE-604 | ||
005 | 20140814 | ||
007 | t | ||
008 | 140704s2014 a||| |||| 00||| eng d | ||
010 | |a 2014003523 | ||
020 | |a 9780124170407 |c paperback |9 978-0-12-417040-7 | ||
035 | |a (OCoLC)884935577 | ||
035 | |a (DE-599)GBV782559239 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-91G | ||
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a DAT 616f |2 stub | ||
084 | |a DAT 250f |2 stub | ||
100 | 1 | |a Messier, Ric |e Verfasser |0 (DE-588)1054096732 |4 aut | |
245 | 1 | 0 | |a Collaboration with cloud computing |b security, social media, and unified communications |c Ric Messier |
264 | 1 | |a Amsterdam [u.a.] |b Elsevier Syngress |c 2014 | |
300 | |a XIX, 222 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | 1 | |a "It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of the activities"-- | |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027396393&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-027396393 |
Datensatz im Suchindex
_version_ | 1804152336137846784 |
---|---|
adam_text | Contents
Preface
.....................................................................................................................xiii
Acknowledgements
.................................................................................................xix
CHAPTER
1
The Evolving Nature of Information Security
..............
ι
Introduction
.....................................................................................1
History of the Internet
.....................................................................2
Significant security events
...............................................................2
Evolution of services
.......................................................................5
Today s risks (in a Nutshell)
............................................................8
Collaboration
.................................................................................12
Conclusion
.....................................................................................13
Summary
.......................................................................................13
CHAPTER
2
Cloud Computing
...................................................15
Introduction
...................................................................................15
The protocols that made it possible
...............................................16
HTTP and HTML
................................................................17
XML
.....................................................................................18
RESTful services
.................................................................19
The cloud
.......................................................................................21
Infrastructure as a service
....................................................24
Platform as a service
............................................................25
Software as a service
............................................................27
Storage
.................................................................................28
Unified communication as a service
.............................................28
Public, private, or hybrid
...............................................................29
Conclusion
.....................................................................................30
Summary
.......................................................................................32
CHAPTER
3
Software as a Service
............................................
зз
Introduction
...................................................................................33
Contact lists
...................................................................................34
Documents on the go
.....................................................................41
Real-time editing
..................................................................46
Geo-diverse
teams
................................................................47
Agendas
................................................................................47
Document sharing
................................................................48
VII
viii Contents
Advantages
....................................................................................48
Security considerations
.................................................................51
Conclusion
.....................................................................................54
Summary
.......................................................................................55
CHAPTER
4
Storage in the Cloud
..............................................57
Introduction
...................................................................................57
Uses of cloud storage
....................................................................58
Collaboration
........................................................................58
Large file transfer
.................................................................59
Backups
................................................................................60
Synchronization
...................................................................60
Security
.........................................................................................61
Privacy concerns
..................................................................61
Data retention
.......................................................................66
Data destruction
...................................................................68
Infrastructure
........................................................................68
Protecting yourself
........................................................................68
Encryption
............................................................................70
Data loss prevention
.............................................................72
Conclusion
.....................................................................................73
Summary
.......................................................................................74
Further reading
..............................................................................75
CHAPTER
5
Virtual Servers and Platform as a Service
...............77
Introduction
...................................................................................77
History of virtualization
................................................................78
How virtualization works
..............................................................81
Hypervisors
..........................................................................82
Snapshots
.............................................................................83
Platform as a service
.....................................................................84
Advantages of PaaS
.............................................................86
Building a business
..............................................................88
Security considerations
.................................................................89
Conclusion
.....................................................................................90
Summary
...................................................................... 91
CHAPTER
6
Social Media
.........................................................
93
Introduction
..................................................... 93
History and impact of social networking
......................................94
Social networking sites
................................ 97
Contents ix
Friendster.............................................................................98
MySpace..............................................................................99
Facebook..............................................................................99
Twitter
................................................................................103
Google!-
............................................................................
107
Crowdsourcing
............................................................................107
Gamification................................................................................109
Human
resources
.........................................................................110
Security considerations
...............................................................111
Conclusion
...................................................................................112
Summary
.....................................................................................113
Further reading
............................................................................113
CHAPTER
7
Mobile Computing
.................................................115
Introduction
.................................................................................115
Smartphones
................................................................................116
Apps
...................................................................................119
Jailbreaking
........................................................................122
Providing mobile access
..............................................................124
Physical security
..........................................................................125
Bring your own device
................................................................129
Boundaries
.........................................................................131
Conclusion
...................................................................................132
Summary
.....................................................................................133
Further reading
............................................................................133
CHAPTER
8
Unified Communications
........................................135
Introduction
.................................................................................135
Signaling
.....................................................................................137
H.323
...........................................................................................139
Session initiation protocol
...........................................................144
Network address translation
...............................................148
Unified communications
.............................................................149
VoIP in the cloud
.........................................................................150
Security considerations
...............................................................152
Conclusion
...................................................................................153
Summary
.....................................................................................154
CHAPTER
9
Remote Workers
...................................................155
Introduction
.................................................................................155
Remote workers
..........................................................................156
Contents
Pros and cons of telecommuting
.................................................159
Management concerns and productivity
............................159
Antisocial behaviors
...........................................................160
Cost savings
.......................................................................161
Communication challenges
................................................162
Human resources and remote hires
....................................163
Asynchronous versus synchronous
.............................................164
Security considerations
...............................................................165
Conclusion
...................................................................................167
Summary
.....................................................................................167
Further reading
............................................................................167
CHAPTER
10
Risk Management and Policy Considerations
.........169
Introduction
.................................................................................169
Risk management
........................................................................170
Quantitative analysis
..........................................................173
Return on investment
.........................................................175
Social return on investment
................................................176
Cost-benefit analysis
.........................................................177
Qualitative assessment
.......................................................178
Security policies
..........................................................................179
Legal and regulatory requirements
....................................181
Controls
..............................................................................182
Conclusion
...................................................................................183
Summary
.....................................................................................183
Further reading
............................................................................184
CHAPTER
11
Future Technology
................................................185
Introduction
.................................................................................185
Pushing into the cloud
.................................................................185
Ubiquitous broadband
.................................................................187
Wearable computing
....................................................................189
Interfaces
................................................................................193
HTML5
.......................................................................................194
Consumers as producers
..............................................................196
Conclusion
.................................................. 197
Summary
............................................. 198
Further reading
............................................................................198
Contents xi
CHAPTER
12
Pulling It All Together
...........................................199
Introduction
.................................................................................199
Background
.................................................................................200
Requirements
...............................................................................201
Messaging
...................................................................................202
Telephony
...........................................................................208
Storage
.........................................................................................210
Human resources
................................................................212
Project management
....................................................................213
Source control
.............................................................................214
Customer relations
......................................................................215
Conclusion
...................................................................................215
Summary
.....................................................................................216
Index
......................................................................................................................217
|
any_adam_object | 1 |
author | Messier, Ric |
author_GND | (DE-588)1054096732 |
author_facet | Messier, Ric |
author_role | aut |
author_sort | Messier, Ric |
author_variant | r m rm |
building | Verbundindex |
bvnumber | BV041953472 |
classification_rvk | ST 200 |
classification_tum | DAT 616f DAT 250f |
ctrlnum | (OCoLC)884935577 (DE-599)GBV782559239 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02467nam a2200373 c 4500</leader><controlfield tag="001">BV041953472</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140814 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">140704s2014 a||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2014003523</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124170407</subfield><subfield code="c">paperback</subfield><subfield code="9">978-0-12-417040-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)884935577</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV782559239</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 616f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 250f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Messier, Ric</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1054096732</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Collaboration with cloud computing</subfield><subfield code="b">security, social media, and unified communications</subfield><subfield code="c">Ric Messier</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam [u.a.]</subfield><subfield code="b">Elsevier Syngress</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIX, 222 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="1" ind2=" "><subfield code="a">"It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of the activities"--</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027396393&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027396393</subfield></datafield></record></collection> |
id | DE-604.BV041953472 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:09:05Z |
institution | BVB |
isbn | 9780124170407 |
language | English |
lccn | 2014003523 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027396393 |
oclc_num | 884935577 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-91G DE-BY-TUM |
owner_facet | DE-473 DE-BY-UBG DE-91G DE-BY-TUM |
physical | XIX, 222 S. Ill. |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Elsevier Syngress |
record_format | marc |
spelling | Messier, Ric Verfasser (DE-588)1054096732 aut Collaboration with cloud computing security, social media, and unified communications Ric Messier Amsterdam [u.a.] Elsevier Syngress 2014 XIX, 222 S. Ill. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index "It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of the activities"-- Cloud Computing (DE-588)7623494-0 gnd rswk-swf Cloud Computing (DE-588)7623494-0 s DE-604 Digitalisierung UB Bamberg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027396393&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Messier, Ric Collaboration with cloud computing security, social media, and unified communications Cloud Computing (DE-588)7623494-0 gnd |
subject_GND | (DE-588)7623494-0 |
title | Collaboration with cloud computing security, social media, and unified communications |
title_auth | Collaboration with cloud computing security, social media, and unified communications |
title_exact_search | Collaboration with cloud computing security, social media, and unified communications |
title_full | Collaboration with cloud computing security, social media, and unified communications Ric Messier |
title_fullStr | Collaboration with cloud computing security, social media, and unified communications Ric Messier |
title_full_unstemmed | Collaboration with cloud computing security, social media, and unified communications Ric Messier |
title_short | Collaboration with cloud computing |
title_sort | collaboration with cloud computing security social media and unified communications |
title_sub | security, social media, and unified communications |
topic | Cloud Computing (DE-588)7623494-0 gnd |
topic_facet | Cloud Computing |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027396393&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT messierric collaborationwithcloudcomputingsecuritysocialmediaandunifiedcommunications |