35986841_10216840653711318_1105697261150535680_n

Collaboration with cloud computing : security, social media, and unified communications / Ric Messier.

By: Messier, Ric
Material type: TextTextPublisher: Amsterdam ; Boston : Syngress, 2014Edition: 1st edDescription: xix, 222 pages : illustrations ; 24 cmContent type: text Media type: unmediated Carrier type: volumeISBN: 9780124170407 (paperback)Subject(s): Information technology -- Security measures | Information technology -- Management | Cloud computing | Computer security | Computer crimes -- PreventionDDC classification: 004.678 LOC classification: QA76.9.A25 | .M4864 2014
Contents:
Machine generated contents note: 1. The Evolving Nature of Information Management Security 2. Cloud Computing 3. Software as a Service 4. Storage in the Cloud 5. Virtual Servers 6. Social Media Risks & Rewards 7. VOIP and Its Risks 8. The Risks and Rewards of Remote Workers 9. Policy Considerations 10. Risk Management 11. New Technologies and Being Agile 12. Future Trends and Outcomes.
Summary: "It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of the activities"--
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode
Books Books Centeral Library
Second Floor - Computer Sciences
004.678 M.R.C 2014 (Browse shelf) Available 23990

Includes bibliographical references and index.

Machine generated contents note: 1. The Evolving Nature of Information Management Security 2. Cloud Computing 3. Software as a Service 4. Storage in the Cloud 5. Virtual Servers 6. Social Media Risks & Rewards 7. VOIP and Its Risks 8. The Risks and Rewards of Remote Workers 9. Policy Considerations 10. Risk Management 11. New Technologies and Being Agile 12. Future Trends and Outcomes.

"It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of the activities"--

There are no comments on this title.

to post a comment.