Collaboration with cloud computing: security, social media, and unified communications
"It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down wh...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam Boston
Syngress
[2014]
|
Schlagworte: | |
Online-Zugang: | FAW01 FLA01 Volltext |
Zusammenfassung: | "It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of the activities"-- |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 online resource |
ISBN: | 9780124171237 0124171230 9780124170407 0124170404 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044390740 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 170630s2014 |||| o||u| ||||||eng d | ||
020 | |a 9780124171237 |9 978-0-12-417123-7 | ||
020 | |a 0124171230 |9 0-12-417123-0 | ||
020 | |a 9780124170407 |9 978-0-12-417040-7 | ||
020 | |a 0124170404 |9 0-12-417040-4 | ||
035 | |a (ZDB-33-ESD)ocn878805648 | ||
035 | |a (OCoLC)878805648 | ||
035 | |a (DE-599)BVBBV044390740 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 004.67/8 |2 23 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
100 | 1 | |a Messier, Ric |e Verfasser |4 aut | |
245 | 1 | 0 | |a Collaboration with cloud computing |b security, social media, and unified communications |c Ric Messier |
264 | 1 | |a Amsterdam |a Boston |b Syngress |c [2014] | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a "It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of the activities"-- | ||
650 | 4 | |a Computing Methodologies | |
650 | 7 | |a COMPUTERS / Computer Literacy |2 bisacsh | |
650 | 7 | |a COMPUTERS / Computer Science |2 bisacsh | |
650 | 7 | |a COMPUTERS / Data Processing |2 bisacsh | |
650 | 7 | |a COMPUTERS / Hardware / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Information Technology |2 bisacsh | |
650 | 7 | |a COMPUTERS / Machine Theory |2 bisacsh | |
650 | 7 | |a COMPUTERS / Reference |2 bisacsh | |
650 | 7 | |a Cloud computing |2 fast | |
650 | 7 | |a Computer crimes / Prevention |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Information technology / Management |2 fast | |
650 | 7 | |a Information technology / Security measures |2 fast | |
650 | 4 | |a Informatik | |
650 | 4 | |a Information technology |x Security measures | |
650 | 4 | |a Information technology |x Management | |
650 | 4 | |a Cloud computing | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer crimes |x Prevention | |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Messier, Ric |t Collaboration with cloud computing |z 9780124170407 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780124170407 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029792962 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9780124170407 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext | |
966 | e | |u http://www.sciencedirect.com/science/book/9780124170407 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804177663291555840 |
---|---|
any_adam_object | |
author | Messier, Ric |
author_facet | Messier, Ric |
author_role | aut |
author_sort | Messier, Ric |
author_variant | r m rm |
building | Verbundindex |
bvnumber | BV044390740 |
classification_rvk | ST 200 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-ESD)ocn878805648 (OCoLC)878805648 (DE-599)BVBBV044390740 |
dewey-full | 004.67/8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.67/8 |
dewey-search | 004.67/8 |
dewey-sort | 14.67 18 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03795nmm a2200685zc 4500</leader><controlfield tag="001">BV044390740</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170630s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124171237</subfield><subfield code="9">978-0-12-417123-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124171230</subfield><subfield code="9">0-12-417123-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124170407</subfield><subfield code="9">978-0-12-417040-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124170404</subfield><subfield code="9">0-12-417040-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn878805648</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)878805648</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044390740</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.67/8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Messier, Ric</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Collaboration with cloud computing</subfield><subfield code="b">security, social media, and unified communications</subfield><subfield code="c">Ric Messier</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="a">Boston</subfield><subfield code="b">Syngress</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of the activities"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computing Methodologies</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Literacy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Data Processing</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Hardware / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Machine Theory</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Reference</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cloud computing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Messier, Ric</subfield><subfield code="t">Collaboration with cloud computing</subfield><subfield code="z">9780124170407</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780124170407</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029792962</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124170407</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124170407</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044390740 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:51:39Z |
institution | BVB |
isbn | 9780124171237 0124171230 9780124170407 0124170404 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029792962 |
oclc_num | 878805648 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 online resource |
psigel | ZDB-33-ESD ZDB-33-EBS ZDB-33-ESD FAW_PDA_ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Syngress |
record_format | marc |
spelling | Messier, Ric Verfasser aut Collaboration with cloud computing security, social media, and unified communications Ric Messier Amsterdam Boston Syngress [2014] 1 online resource txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index "It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of the activities"-- Computing Methodologies COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Cloud computing fast Computer crimes / Prevention fast Computer security fast Information technology / Management fast Information technology / Security measures fast Informatik Information technology Security measures Information technology Management Cloud computing Computer security Computer crimes Prevention Cloud Computing (DE-588)7623494-0 gnd rswk-swf Cloud Computing (DE-588)7623494-0 s 1\p DE-604 Erscheint auch als Druck-Ausgabe Messier, Ric Collaboration with cloud computing 9780124170407 http://www.sciencedirect.com/science/book/9780124170407 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Messier, Ric Collaboration with cloud computing security, social media, and unified communications Computing Methodologies COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Cloud computing fast Computer crimes / Prevention fast Computer security fast Information technology / Management fast Information technology / Security measures fast Informatik Information technology Security measures Information technology Management Cloud computing Computer security Computer crimes Prevention Cloud Computing (DE-588)7623494-0 gnd |
subject_GND | (DE-588)7623494-0 |
title | Collaboration with cloud computing security, social media, and unified communications |
title_auth | Collaboration with cloud computing security, social media, and unified communications |
title_exact_search | Collaboration with cloud computing security, social media, and unified communications |
title_full | Collaboration with cloud computing security, social media, and unified communications Ric Messier |
title_fullStr | Collaboration with cloud computing security, social media, and unified communications Ric Messier |
title_full_unstemmed | Collaboration with cloud computing security, social media, and unified communications Ric Messier |
title_short | Collaboration with cloud computing |
title_sort | collaboration with cloud computing security social media and unified communications |
title_sub | security, social media, and unified communications |
topic | Computing Methodologies COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Cloud computing fast Computer crimes / Prevention fast Computer security fast Information technology / Management fast Information technology / Security measures fast Informatik Information technology Security measures Information technology Management Cloud computing Computer security Computer crimes Prevention Cloud Computing (DE-588)7623494-0 gnd |
topic_facet | Computing Methodologies COMPUTERS / Computer Literacy COMPUTERS / Computer Science COMPUTERS / Data Processing COMPUTERS / Hardware / General COMPUTERS / Information Technology COMPUTERS / Machine Theory COMPUTERS / Reference Cloud computing Computer crimes / Prevention Computer security Information technology / Management Information technology / Security measures Informatik Information technology Security measures Information technology Management Computer crimes Prevention Cloud Computing |
url | http://www.sciencedirect.com/science/book/9780124170407 |
work_keys_str_mv | AT messierric collaborationwithcloudcomputingsecuritysocialmediaandunifiedcommunications |