Narrow Search
Search narrowed by
Last searches

Results for *

Displaying results 1 to 1 of 1.

  1. Collaboration with cloud computing
    security, social media, and unified communications
    Author: Messier, Ric
    Published: [2014]; ©2014
    Publisher:  Syngress, Amsterdam

    "It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses... more

    Staats- und Universitätsbibliothek Hamburg Carl von Ossietzky
    A 2014/4376
    Unlimited inter-library loan, copies and loan
    Universitätsbibliothek Leipzig
    Unlimited inter-library loan, copies and loan

     

    "It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of the activities"--

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Contributor: Konar, Allan (HerausgeberIn)
    Language: English
    Media type: Book
    Format: Print
    ISBN: 0124170404; 9780124170407
    RVK Categories: ST 200
    Series: Syngress
    Subjects: Information technology; Information technology; Cloud computing; Computer security; Computer crimes; Cloud computing; Computer crimes; Computer security; Information technology; Information technology; Information technology; Information technology; Cloud computing; Computer security; Computer crimes
    Scope: xix, 222 Seiten, Diagramme, 24 cm
    Notes:

    Machine generated contents note: 1. The Evolving Nature of Information Management Security 2. Cloud Computing 3. Software as a Service 4. Storage in the Cloud 5. Virtual Servers 6. Social Media Risks & Rewards 7. VOIP and Its Risks 8. The Risks and Rewards of Remote Workers 9. Policy Considerations 10. Risk Management 11. New Technologies and Being Agile 12. Future Trends and Outcomes. - Includes bibliographical references and index

    Machine generated contents note: 1. The Evolving Nature of Information Management Security 2. Cloud Computing 3. Software as a Service 4. Storage in the Cloud 5. Virtual Servers and Platform as a Service 6. Social Media 7. Mobile Computing 8. Unified Communications 9. Remote Workers 10. Risk Management and Policy Considerations 11. Future Technology 12. Pulling it all Together