Bring your own devices (BYOD) survival guide / / Jessica Keyes |
Autore | Keyes Jessica <1950, > |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2013 |
Descrizione fisica | 1 online resource (443 p.) |
Disciplina | 004.068/8 |
Soggetto topico | Computer technical support |
Soggetto genere / forma | Electronic books. |
ISBN |
0-429-10017-5
1-4822-0972-1 1-4665-6504-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Contents; Preface; About the Author; Chapter 1 - The BYOD Revolution; Chapter 2 - Making a Financial Case for BYOD; Chapter 3 - Integrating BYOD into Performance Measurement and Management Systems; Chapter 4 - Assessment and Mitigation of Risks in a BYOD Environment; Chapter 5 - Guidelines for Managing and Securing Mobile Devices in the Enterprise; Chapter 6 - Cloud Best Practices; Chapter 7 - Configuration Management in a BYOD Environment; Chapter 8 - Content Management, Mobile and Otherwise; Chapter 9 - Integrating BYOD into Resource Management
Chapter 10 - BYOD Means Social NetworkingQuick Start 1: Software-Based Authentication; Quick Start 2: BYOD: Making It Work for Your Firm; Quick Start 3: Software Selection from Multiple Packages; Quick Start 4: The Make-Buy Decision; Quick Start 5: Balanced Scorecard Metrics; Quick Start 6: Common BYOD Mistakes; Quick Start 7: BYOD Corporate Policy; Quick Start 8: Mobile Device Management Functionality Guide; Quick Start 9: Legal Issues with BYOD; Quick Start 10: Managing Online Content Checklist; Quick Start 11: Selecting a Content Management System Checklist Quick Start 12: BYOD Lessons LearnedQuick Start 13: BYOD Risks; Quick Start 14: Getting Started with BYOD; Quick Start 15: BYOD Security Tips; Quick Start 16: Cloud Migration Tips; Quick Start 17: Hitching Your Network to BYOD; Appendix A: Security Glossary; Appendix B: Employee Mobile Device Agreement; Appendix C: Mobile Device Security Checklist; Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices; Appendix E: Traditional IT Metrics Reference; Appendix F: Cloud Procurement Questions; Appendix G: Computer Use Policy; Appendix H: Benchmarking Data Collection Methods Appendix I: Wireless Device AgreementAppendix J: Mobile Device Management Vendors; Appendix K: Best Practices Security Checklist; Back Cover |
Record Nr. | UNINA-9910462915103321 |
Keyes Jessica <1950, > | ||
Boca Raton, Fla. : , : CRC Press, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Bring your own devices (BYOD) survival guide / / Jessica Keyes |
Autore | Keyes Jessica <1950, > |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2013 |
Descrizione fisica | 1 online resource (443 p.) |
Disciplina | 004.068/8 |
Soggetto topico | Computer technical support |
ISBN |
1-4822-0973-X
0-429-10017-5 1-4822-0972-1 1-4665-6504-7 |
Classificazione | BUS087000COM032000COM043000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Contents; Preface; About the Author; Chapter 1 - The BYOD Revolution; Chapter 2 - Making a Financial Case for BYOD; Chapter 3 - Integrating BYOD into Performance Measurement and Management Systems; Chapter 4 - Assessment and Mitigation of Risks in a BYOD Environment; Chapter 5 - Guidelines for Managing and Securing Mobile Devices in the Enterprise; Chapter 6 - Cloud Best Practices; Chapter 7 - Configuration Management in a BYOD Environment; Chapter 8 - Content Management, Mobile and Otherwise; Chapter 9 - Integrating BYOD into Resource Management
Chapter 10 - BYOD Means Social NetworkingQuick Start 1: Software-Based Authentication; Quick Start 2: BYOD: Making It Work for Your Firm; Quick Start 3: Software Selection from Multiple Packages; Quick Start 4: The Make-Buy Decision; Quick Start 5: Balanced Scorecard Metrics; Quick Start 6: Common BYOD Mistakes; Quick Start 7: BYOD Corporate Policy; Quick Start 8: Mobile Device Management Functionality Guide; Quick Start 9: Legal Issues with BYOD; Quick Start 10: Managing Online Content Checklist; Quick Start 11: Selecting a Content Management System Checklist Quick Start 12: BYOD Lessons LearnedQuick Start 13: BYOD Risks; Quick Start 14: Getting Started with BYOD; Quick Start 15: BYOD Security Tips; Quick Start 16: Cloud Migration Tips; Quick Start 17: Hitching Your Network to BYOD; Appendix A: Security Glossary; Appendix B: Employee Mobile Device Agreement; Appendix C: Mobile Device Security Checklist; Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices; Appendix E: Traditional IT Metrics Reference; Appendix F: Cloud Procurement Questions; Appendix G: Computer Use Policy; Appendix H: Benchmarking Data Collection Methods Appendix I: Wireless Device AgreementAppendix J: Mobile Device Management Vendors; Appendix K: Best Practices Security Checklist; Back Cover |
Record Nr. | UNINA-9910786227103321 |
Keyes Jessica <1950, > | ||
Boca Raton, Fla. : , : CRC Press, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Bring your own devices (BYOD) survival guide / / Jessica Keyes |
Autore | Keyes Jessica <1950, > |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2013 |
Descrizione fisica | 1 online resource (443 p.) |
Disciplina | 004.068/8 |
Soggetto topico | Computer technical support |
ISBN |
1-4822-0973-X
0-429-10017-5 1-4822-0972-1 1-4665-6504-7 |
Classificazione | BUS087000COM032000COM043000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Contents; Preface; About the Author; Chapter 1 - The BYOD Revolution; Chapter 2 - Making a Financial Case for BYOD; Chapter 3 - Integrating BYOD into Performance Measurement and Management Systems; Chapter 4 - Assessment and Mitigation of Risks in a BYOD Environment; Chapter 5 - Guidelines for Managing and Securing Mobile Devices in the Enterprise; Chapter 6 - Cloud Best Practices; Chapter 7 - Configuration Management in a BYOD Environment; Chapter 8 - Content Management, Mobile and Otherwise; Chapter 9 - Integrating BYOD into Resource Management
Chapter 10 - BYOD Means Social NetworkingQuick Start 1: Software-Based Authentication; Quick Start 2: BYOD: Making It Work for Your Firm; Quick Start 3: Software Selection from Multiple Packages; Quick Start 4: The Make-Buy Decision; Quick Start 5: Balanced Scorecard Metrics; Quick Start 6: Common BYOD Mistakes; Quick Start 7: BYOD Corporate Policy; Quick Start 8: Mobile Device Management Functionality Guide; Quick Start 9: Legal Issues with BYOD; Quick Start 10: Managing Online Content Checklist; Quick Start 11: Selecting a Content Management System Checklist Quick Start 12: BYOD Lessons LearnedQuick Start 13: BYOD Risks; Quick Start 14: Getting Started with BYOD; Quick Start 15: BYOD Security Tips; Quick Start 16: Cloud Migration Tips; Quick Start 17: Hitching Your Network to BYOD; Appendix A: Security Glossary; Appendix B: Employee Mobile Device Agreement; Appendix C: Mobile Device Security Checklist; Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices; Appendix E: Traditional IT Metrics Reference; Appendix F: Cloud Procurement Questions; Appendix G: Computer Use Policy; Appendix H: Benchmarking Data Collection Methods Appendix I: Wireless Device AgreementAppendix J: Mobile Device Management Vendors; Appendix K: Best Practices Security Checklist; Back Cover |
Record Nr. | UNINA-9910800042003321 |
Keyes Jessica <1950, > | ||
Boca Raton, Fla. : , : CRC Press, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Bring your own devices (BYOD) survival guide / / Jessica Keyes |
Autore | Keyes Jessica <1950, > |
Edizione | [1st edition] |
Pubbl/distr/stampa | Boca Raton, Fla. : , : CRC Press, , 2013 |
Descrizione fisica | 1 online resource (443 p.) |
Disciplina | 004.068/8 |
Soggetto topico | Computer technical support |
ISBN |
1-4822-0973-X
0-429-10017-5 1-4822-0972-1 1-4665-6504-7 |
Classificazione | BUS087000COM032000COM043000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Contents; Preface; About the Author; Chapter 1 - The BYOD Revolution; Chapter 2 - Making a Financial Case for BYOD; Chapter 3 - Integrating BYOD into Performance Measurement and Management Systems; Chapter 4 - Assessment and Mitigation of Risks in a BYOD Environment; Chapter 5 - Guidelines for Managing and Securing Mobile Devices in the Enterprise; Chapter 6 - Cloud Best Practices; Chapter 7 - Configuration Management in a BYOD Environment; Chapter 8 - Content Management, Mobile and Otherwise; Chapter 9 - Integrating BYOD into Resource Management
Chapter 10 - BYOD Means Social NetworkingQuick Start 1: Software-Based Authentication; Quick Start 2: BYOD: Making It Work for Your Firm; Quick Start 3: Software Selection from Multiple Packages; Quick Start 4: The Make-Buy Decision; Quick Start 5: Balanced Scorecard Metrics; Quick Start 6: Common BYOD Mistakes; Quick Start 7: BYOD Corporate Policy; Quick Start 8: Mobile Device Management Functionality Guide; Quick Start 9: Legal Issues with BYOD; Quick Start 10: Managing Online Content Checklist; Quick Start 11: Selecting a Content Management System Checklist Quick Start 12: BYOD Lessons LearnedQuick Start 13: BYOD Risks; Quick Start 14: Getting Started with BYOD; Quick Start 15: BYOD Security Tips; Quick Start 16: Cloud Migration Tips; Quick Start 17: Hitching Your Network to BYOD; Appendix A: Security Glossary; Appendix B: Employee Mobile Device Agreement; Appendix C: Mobile Device Security Checklist; Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices; Appendix E: Traditional IT Metrics Reference; Appendix F: Cloud Procurement Questions; Appendix G: Computer Use Policy; Appendix H: Benchmarking Data Collection Methods Appendix I: Wireless Device AgreementAppendix J: Mobile Device Management Vendors; Appendix K: Best Practices Security Checklist; Back Cover |
Record Nr. | UNINA-9910811644503321 |
Keyes Jessica <1950, > | ||
Boca Raton, Fla. : , : CRC Press, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security issues of IT outsourcing [[electronic resource] /] / guest editors: Sokratis K. Katsikas and Stefanos Gritzalis |
Pubbl/distr/stampa | Bradford, England, : Emerald Group Publishing, c2006 |
Descrizione fisica | 1 online resource (114 p.) |
Disciplina | 004.068/8 |
Altri autori (Persone) |
GritzalisStefanos
KatsikasSokratis |
Collana | Information Management & Computer Security |
Soggetto topico |
Computer security
Electronic data processing departments - Contracting out |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-73767-0
9786610737673 1-84663-203-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; CONTENTS; EDITORIAL ADVISORY BOARD; Guest editorial; A framework for outsourcing IS/IT security services; Security information management as an outsourced service; Outsourcing digital signatures: a solution to key management burden; Information technologies for business continuity: an implementation framework; IT applications in Kuwaiti financial companies: an analysis; A modular approach to ERP system selection; An exploratory study of the critical factors affecting the acceptability of e-learning in Nigerian universities; Awards for Excellence; Note from the publisher
Call for papers |
Record Nr. | UNINA-9910450750603321 |
Bradford, England, : Emerald Group Publishing, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security issues of IT outsourcing [[electronic resource] /] / guest editors: Sokratis K. Katsikas and Stefanos Gritzalis |
Pubbl/distr/stampa | Bradford, England, : Emerald Group Publishing, c2006 |
Descrizione fisica | 1 online resource (114 p.) |
Disciplina | 004.068/8 |
Altri autori (Persone) |
GritzalisStefanos
KatsikasSokratis |
Collana | Information Management & Computer Security |
Soggetto topico |
Computer security
Electronic data processing departments - Contracting out |
ISBN |
1-280-73767-0
9786610737673 1-84663-203-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; CONTENTS; EDITORIAL ADVISORY BOARD; Guest editorial; A framework for outsourcing IS/IT security services; Security information management as an outsourced service; Outsourcing digital signatures: a solution to key management burden; Information technologies for business continuity: an implementation framework; IT applications in Kuwaiti financial companies: an analysis; A modular approach to ERP system selection; An exploratory study of the critical factors affecting the acceptability of e-learning in Nigerian universities; Awards for Excellence; Note from the publisher
Call for papers |
Record Nr. | UNINA-9910784027503321 |
Bradford, England, : Emerald Group Publishing, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security issues of IT outsourcing [[electronic resource] /] / guest editors: Sokratis K. Katsikas and Stefanos Gritzalis |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Bradford, England, : Emerald Group Publishing, c2006 |
Descrizione fisica | 1 online resource (114 p.) |
Disciplina | 004.068/8 |
Altri autori (Persone) |
GritzalisStefanos
KatsikasSokratis |
Collana | Information Management & Computer Security |
Soggetto topico |
Computer security
Electronic data processing departments - Contracting out |
ISBN |
1-280-73767-0
9786610737673 1-84663-203-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; CONTENTS; EDITORIAL ADVISORY BOARD; Guest editorial; A framework for outsourcing IS/IT security services; Security information management as an outsourced service; Outsourcing digital signatures: a solution to key management burden; Information technologies for business continuity: an implementation framework; IT applications in Kuwaiti financial companies: an analysis; A modular approach to ERP system selection; An exploratory study of the critical factors affecting the acceptability of e-learning in Nigerian universities; Awards for Excellence; Note from the publisher
Call for papers |
Record Nr. | UNINA-9910821008203321 |
Bradford, England, : Emerald Group Publishing, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|