top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Bring your own devices (BYOD) survival guide / / Jessica Keyes
Bring your own devices (BYOD) survival guide / / Jessica Keyes
Autore Keyes Jessica <1950, >
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton, Fla. : , : CRC Press, , 2013
Descrizione fisica 1 online resource (443 p.)
Disciplina 004.068/8
Soggetto topico Computer technical support
ISBN 1-4822-0973-X
0-429-10017-5
1-4822-0972-1
1-4665-6504-7
Classificazione BUS087000COM032000COM043000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Preface; About the Author; Chapter 1 - The BYOD Revolution; Chapter 2 - Making a Financial Case for BYOD; Chapter 3 - Integrating BYOD into Performance Measurement and Management Systems; Chapter 4 - Assessment and Mitigation of Risks in a BYOD Environment; Chapter 5 - Guidelines for Managing and Securing Mobile Devices in the Enterprise; Chapter 6 - Cloud Best Practices; Chapter 7 - Configuration Management in a BYOD Environment; Chapter 8 - Content Management, Mobile and Otherwise; Chapter 9 - Integrating BYOD into Resource Management
Chapter 10 - BYOD Means Social NetworkingQuick Start 1: Software-Based Authentication; Quick Start 2: BYOD: Making It Work for Your Firm; Quick Start 3: Software Selection from Multiple Packages; Quick Start 4: The Make-Buy Decision; Quick Start 5: Balanced Scorecard Metrics; Quick Start 6: Common BYOD Mistakes; Quick Start 7: BYOD Corporate Policy; Quick Start 8: Mobile Device Management Functionality Guide; Quick Start 9: Legal Issues with BYOD; Quick Start 10: Managing Online Content Checklist; Quick Start 11: Selecting a Content Management System Checklist
Quick Start 12: BYOD Lessons LearnedQuick Start 13: BYOD Risks; Quick Start 14: Getting Started with BYOD; Quick Start 15: BYOD Security Tips; Quick Start 16: Cloud Migration Tips; Quick Start 17: Hitching Your Network to BYOD; Appendix A: Security Glossary; Appendix B: Employee Mobile Device Agreement; Appendix C: Mobile Device Security Checklist; Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices; Appendix E: Traditional IT Metrics Reference; Appendix F: Cloud Procurement Questions; Appendix G: Computer Use Policy; Appendix H: Benchmarking Data Collection Methods
Appendix I: Wireless Device AgreementAppendix J: Mobile Device Management Vendors; Appendix K: Best Practices Security Checklist; Back Cover
Record Nr. UNINA-9910786227103321
Keyes Jessica <1950, >  
Boca Raton, Fla. : , : CRC Press, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Bring your own devices (BYOD) survival guide / / Jessica Keyes
Bring your own devices (BYOD) survival guide / / Jessica Keyes
Autore Keyes Jessica <1950, >
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton, Fla. : , : CRC Press, , 2013
Descrizione fisica 1 online resource (443 p.)
Disciplina 004.068/8
Soggetto topico Computer technical support
ISBN 1-4822-0973-X
0-429-10017-5
1-4822-0972-1
1-4665-6504-7
Classificazione BUS087000COM032000COM043000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Preface; About the Author; Chapter 1 - The BYOD Revolution; Chapter 2 - Making a Financial Case for BYOD; Chapter 3 - Integrating BYOD into Performance Measurement and Management Systems; Chapter 4 - Assessment and Mitigation of Risks in a BYOD Environment; Chapter 5 - Guidelines for Managing and Securing Mobile Devices in the Enterprise; Chapter 6 - Cloud Best Practices; Chapter 7 - Configuration Management in a BYOD Environment; Chapter 8 - Content Management, Mobile and Otherwise; Chapter 9 - Integrating BYOD into Resource Management
Chapter 10 - BYOD Means Social NetworkingQuick Start 1: Software-Based Authentication; Quick Start 2: BYOD: Making It Work for Your Firm; Quick Start 3: Software Selection from Multiple Packages; Quick Start 4: The Make-Buy Decision; Quick Start 5: Balanced Scorecard Metrics; Quick Start 6: Common BYOD Mistakes; Quick Start 7: BYOD Corporate Policy; Quick Start 8: Mobile Device Management Functionality Guide; Quick Start 9: Legal Issues with BYOD; Quick Start 10: Managing Online Content Checklist; Quick Start 11: Selecting a Content Management System Checklist
Quick Start 12: BYOD Lessons LearnedQuick Start 13: BYOD Risks; Quick Start 14: Getting Started with BYOD; Quick Start 15: BYOD Security Tips; Quick Start 16: Cloud Migration Tips; Quick Start 17: Hitching Your Network to BYOD; Appendix A: Security Glossary; Appendix B: Employee Mobile Device Agreement; Appendix C: Mobile Device Security Checklist; Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices; Appendix E: Traditional IT Metrics Reference; Appendix F: Cloud Procurement Questions; Appendix G: Computer Use Policy; Appendix H: Benchmarking Data Collection Methods
Appendix I: Wireless Device AgreementAppendix J: Mobile Device Management Vendors; Appendix K: Best Practices Security Checklist; Back Cover
Record Nr. UNINA-9910800042003321
Keyes Jessica <1950, >  
Boca Raton, Fla. : , : CRC Press, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Bring your own devices (BYOD) survival guide / / Jessica Keyes
Bring your own devices (BYOD) survival guide / / Jessica Keyes
Autore Keyes Jessica <1950, >
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton, Fla. : , : CRC Press, , 2013
Descrizione fisica 1 online resource (443 p.)
Disciplina 004.068/8
Soggetto topico Computer technical support
ISBN 1-4822-0973-X
0-429-10017-5
1-4822-0972-1
1-4665-6504-7
Classificazione BUS087000COM032000COM043000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Preface; About the Author; Chapter 1 - The BYOD Revolution; Chapter 2 - Making a Financial Case for BYOD; Chapter 3 - Integrating BYOD into Performance Measurement and Management Systems; Chapter 4 - Assessment and Mitigation of Risks in a BYOD Environment; Chapter 5 - Guidelines for Managing and Securing Mobile Devices in the Enterprise; Chapter 6 - Cloud Best Practices; Chapter 7 - Configuration Management in a BYOD Environment; Chapter 8 - Content Management, Mobile and Otherwise; Chapter 9 - Integrating BYOD into Resource Management
Chapter 10 - BYOD Means Social NetworkingQuick Start 1: Software-Based Authentication; Quick Start 2: BYOD: Making It Work for Your Firm; Quick Start 3: Software Selection from Multiple Packages; Quick Start 4: The Make-Buy Decision; Quick Start 5: Balanced Scorecard Metrics; Quick Start 6: Common BYOD Mistakes; Quick Start 7: BYOD Corporate Policy; Quick Start 8: Mobile Device Management Functionality Guide; Quick Start 9: Legal Issues with BYOD; Quick Start 10: Managing Online Content Checklist; Quick Start 11: Selecting a Content Management System Checklist
Quick Start 12: BYOD Lessons LearnedQuick Start 13: BYOD Risks; Quick Start 14: Getting Started with BYOD; Quick Start 15: BYOD Security Tips; Quick Start 16: Cloud Migration Tips; Quick Start 17: Hitching Your Network to BYOD; Appendix A: Security Glossary; Appendix B: Employee Mobile Device Agreement; Appendix C: Mobile Device Security Checklist; Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices; Appendix E: Traditional IT Metrics Reference; Appendix F: Cloud Procurement Questions; Appendix G: Computer Use Policy; Appendix H: Benchmarking Data Collection Methods
Appendix I: Wireless Device AgreementAppendix J: Mobile Device Management Vendors; Appendix K: Best Practices Security Checklist; Back Cover
Record Nr. UNINA-9910811644503321
Keyes Jessica <1950, >  
Boca Raton, Fla. : , : CRC Press, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data center storage [[electronic resource] ] : cost-effective strategies, implementation, and management / / Hubbert Smith
Data center storage [[electronic resource] ] : cost-effective strategies, implementation, and management / / Hubbert Smith
Autore Smith Hubbert
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton, Fla., : Auerbach Publications, c2011
Descrizione fisica 1 online resource (363 p.)
Disciplina 004.5
Soggetto topico Computer storage devices
Electronic data processing departments - Management
ISBN 1-4665-0781-0
0-429-15223-X
1-4398-3488-1
Classificazione BUS087000COM032000COM043000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Dedication; Contents; About the author; What, Exactly, Will We Accomplish?; Part I: Building Blocks, Power, and Consolidation; Chapter 1: The Disk Drive: The Fundamental Building Block of Enterprise Storage; Chapter 2: Power and AC; Chapter 3: Storage Consolidation; Chapter 4: Service Level Overview; Chapter 5: Uptime, Reliability, and SLAs; Chapter 6: Storage Tiering and SLAs; Chapter 7: Service Level Agreements and IT Bill-Back; Chapter 8: Demonstrating Delivery on SLA Service Levels; Chapter 9: Planning for Growth and Storage Tiering; Chapter 10: Wrap-Up: Projects Within Reach
Part II: Managing Aging Data and E-Mail ExpensesChapter 11: Migration and Retiring Aging Systems; Chapter 12: Shared Folders and Content Management; Chapter 13: Storage Strategies for E-Mail; Chapter 14: Spending Wisely on Performance; Chapter 15: Performance and Backup; Chapter 16: The Right Tools for Reliability, Uptime, Disaster Recovery, and Archiving; Chapter 17: Reliability and Server Failover; Chapter 18: Reliability and Continuous Data Protection, Synchronous Replication; Chapter 19: Reliability and Near-Continuous Data Protection, Asynchronous Replication
Chapter 20: Reliability and Data Integrity (T10-DIF or T10-PI)Chapter 21: Virtualization Overview: Focus on the Business Benefits; Chapter 22: Storage Virtualization; Chapter 23: Virtualization, Storage Tiers, and Manual Data Movement; Chapter 24: Virtual Desktop Infrastructure (VDI); Chapter 25: Converged NAS and SAN; Chapter 26: Storage for Nontraditional IT Applications; Chapter 27: Part II Wrap-Up: Projects Within Reach; Part II: Conclusions; Part III: Managed Hosting and Cloud; Chapter 28: Managed Hosting and Cloud Computing
Chapter 29: The Business Driving Managed Hosting: What It Means to YouChapter 30: Managed Hosting Vetting Process; Chapter 31: Why Cloud is Relevant; Chapter 32: Implementing Cloud Storage in Your Operation; Chapter 33: Hybrid Cloud; Chapter 34: Cloud Spectrum of Options; Chapter 35: End Game and Hardware Roadmap to Leverage the Cloud; Chapter 36: Strategy and Execution; Chapter 37: Constructing a Roadmap; Chapter 38: Risk Management; Chapter 39: Part III Wrap-Up: Projects Within Reach; Part III: Conclusion; Appendix A: Storage Protocol Basics; Appendix B: Project Management
Appendix C: People, Process, TechnologyAppendix D: Root Cause, Corrective Action Process; Appendix E: Iometer: Performance Testing in the Lab; Glossary; A; B; C; D; F; G; H; I; L; M; N; O; P; R; S; T; W; Z
Record Nr. UNINA-9910781585503321
Smith Hubbert  
Boca Raton, Fla., : Auerbach Publications, c2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data center storage : cost-effective strategies, implementation, and management / / Hubbert Smith
Data center storage : cost-effective strategies, implementation, and management / / Hubbert Smith
Autore Smith Hubbert
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton, Fla., : Auerbach Publications, c2011
Descrizione fisica 1 online resource (363 p.)
Disciplina 004.5
Soggetto topico Computer storage devices
Electronic data processing departments - Management
ISBN 1-4665-0781-0
0-429-15223-X
1-4398-3488-1
Classificazione BUS087000COM032000COM043000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Dedication; Contents; About the author; What, Exactly, Will We Accomplish?; Part I: Building Blocks, Power, and Consolidation; Chapter 1: The Disk Drive: The Fundamental Building Block of Enterprise Storage; Chapter 2: Power and AC; Chapter 3: Storage Consolidation; Chapter 4: Service Level Overview; Chapter 5: Uptime, Reliability, and SLAs; Chapter 6: Storage Tiering and SLAs; Chapter 7: Service Level Agreements and IT Bill-Back; Chapter 8: Demonstrating Delivery on SLA Service Levels; Chapter 9: Planning for Growth and Storage Tiering; Chapter 10: Wrap-Up: Projects Within Reach
Part II: Managing Aging Data and E-Mail ExpensesChapter 11: Migration and Retiring Aging Systems; Chapter 12: Shared Folders and Content Management; Chapter 13: Storage Strategies for E-Mail; Chapter 14: Spending Wisely on Performance; Chapter 15: Performance and Backup; Chapter 16: The Right Tools for Reliability, Uptime, Disaster Recovery, and Archiving; Chapter 17: Reliability and Server Failover; Chapter 18: Reliability and Continuous Data Protection, Synchronous Replication; Chapter 19: Reliability and Near-Continuous Data Protection, Asynchronous Replication
Chapter 20: Reliability and Data Integrity (T10-DIF or T10-PI)Chapter 21: Virtualization Overview: Focus on the Business Benefits; Chapter 22: Storage Virtualization; Chapter 23: Virtualization, Storage Tiers, and Manual Data Movement; Chapter 24: Virtual Desktop Infrastructure (VDI); Chapter 25: Converged NAS and SAN; Chapter 26: Storage for Nontraditional IT Applications; Chapter 27: Part II Wrap-Up: Projects Within Reach; Part II: Conclusions; Part III: Managed Hosting and Cloud; Chapter 28: Managed Hosting and Cloud Computing
Chapter 29: The Business Driving Managed Hosting: What It Means to YouChapter 30: Managed Hosting Vetting Process; Chapter 31: Why Cloud is Relevant; Chapter 32: Implementing Cloud Storage in Your Operation; Chapter 33: Hybrid Cloud; Chapter 34: Cloud Spectrum of Options; Chapter 35: End Game and Hardware Roadmap to Leverage the Cloud; Chapter 36: Strategy and Execution; Chapter 37: Constructing a Roadmap; Chapter 38: Risk Management; Chapter 39: Part III Wrap-Up: Projects Within Reach; Part III: Conclusion; Appendix A: Storage Protocol Basics; Appendix B: Project Management
Appendix C: People, Process, TechnologyAppendix D: Root Cause, Corrective Action Process; Appendix E: Iometer: Performance Testing in the Lab; Glossary; A; B; C; D; F; G; H; I; L; M; N; O; P; R; S; T; W; Z
Record Nr. UNINA-9910826154003321
Smith Hubbert  
Boca Raton, Fla., : Auerbach Publications, c2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui