
Collaboration with Cloud Computing
Security, Social Media, and Unified Communications
- 1st Edition - April 7, 2014
- Imprint: Syngress
- Author: Ric Messier
- Language: English
- Paperback ISBN:9 7 8 - 0 - 1 2 - 4 1 7 0 4 0 - 7
- eBook ISBN:9 7 8 - 0 - 1 2 - 4 1 7 1 2 3 - 7
Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage… Read more

Purchase options

Institutional subscription on ScienceDirect
Request a sales quoteCollaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions.
Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses:
- The evolving nature of information security
- The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP
- Social media and security risks in the enterprise
- The risks and rewards of allowing remote connectivity and accessibility to the enterprise network
- Discusses the risks associated with technologies such as social media, voice over IP (VoIP) and cloud computing and provides guidance on how to manage that risk through policy changes and technical solutions
- Presents a detailed look at the risks and rewards associated with cloud computing and storage as well as software as a service (SaaS) and includes pertinent case studies
- Explores the risks associated with the use of social media to the enterprise network
- Covers the bring-your-own-device (BYOD) trend, including policy considerations and technical requirements
Information security professionals, system administrators, Security managers
Dedication
Preface
Intended audience
Organization of this book
Acknowledgements
1. The Evolving Nature of Information Security
Information Included in This Chapter
Introduction
History of the Internet
Significant security events
Evolution of services
Today’s risks (in a Nutshell)
Collaboration
Conclusion
Summary
2. Cloud Computing
Information Included in This Chapter
Introduction
The protocols that made it possible
The cloud
Unified communication as a service
Public, private, or hybrid
Conclusion
Summary
3. Software as a Service
Information Included in This Chapter
Introduction
Contact lists
Documents on the go
Advantages
Security considerations
Conclusion
Summary
4. Storage in the Cloud
Information Included in This Chapter
Introduction
Uses of cloud storage
Security
Protecting yourself
Conclusion
Summary
Further reading
5. Virtual Servers and Platform as a Service
Information Included in This Chapter
Introduction
History of virtualization
How virtualization works
Platform as a service
Security considerations
Conclusion
Summary
6. Social Media
Information Included in This Chapter
Introduction
History and impact of social networking
Social networking sites
Crowdsourcing
Gamification
Human resources
Security considerations
Conclusion
Summary
Further reading
7. Mobile Computing
Information Included in This Chapter
Introduction
Smartphones
Providing mobile access
Physical security
Bring your own device
Conclusion
Summary
Further reading
8. Unified Communications
Information Included in This Chapter
Introduction
Signaling
H.323
Session initiation protocol
Unified communications
VoIP in the cloud
Security considerations
Conclusion
Summary
9. Remote Workers
Information Included in This Chapter
Introduction
Remote workers
Pros and cons of telecommuting
Asynchronous versus synchronous
Security considerations
Conclusion
Summary
Further reading
10. Risk Management and Policy Considerations
Information Included in This Chapter
Introduction
Risk management
Security policies
Conclusion
Summary
Further reading
11. Future Technology
Information Included in This Chapter
Introduction
Pushing into the cloud
Ubiquitous broadband
Wearable computing
Interfaces
HTML5
Consumers as producers
Conclusion
Summary
Further reading
12. Pulling It All Together
Information Included in This Chapter
Introduction
Background
Requirements
Messaging
Storage
Project management
Source control
Customer relations
Conclusion
Summary
Index
Preface
Intended audience
Organization of this book
Acknowledgements
1. The Evolving Nature of Information Security
Information Included in This Chapter
Introduction
History of the Internet
Significant security events
Evolution of services
Today’s risks (in a Nutshell)
Collaboration
Conclusion
Summary
2. Cloud Computing
Information Included in This Chapter
Introduction
The protocols that made it possible
The cloud
Unified communication as a service
Public, private, or hybrid
Conclusion
Summary
3. Software as a Service
Information Included in This Chapter
Introduction
Contact lists
Documents on the go
Advantages
Security considerations
Conclusion
Summary
4. Storage in the Cloud
Information Included in This Chapter
Introduction
Uses of cloud storage
Security
Protecting yourself
Conclusion
Summary
Further reading
5. Virtual Servers and Platform as a Service
Information Included in This Chapter
Introduction
History of virtualization
How virtualization works
Platform as a service
Security considerations
Conclusion
Summary
6. Social Media
Information Included in This Chapter
Introduction
History and impact of social networking
Social networking sites
Crowdsourcing
Gamification
Human resources
Security considerations
Conclusion
Summary
Further reading
7. Mobile Computing
Information Included in This Chapter
Introduction
Smartphones
Providing mobile access
Physical security
Bring your own device
Conclusion
Summary
Further reading
8. Unified Communications
Information Included in This Chapter
Introduction
Signaling
H.323
Session initiation protocol
Unified communications
VoIP in the cloud
Security considerations
Conclusion
Summary
9. Remote Workers
Information Included in This Chapter
Introduction
Remote workers
Pros and cons of telecommuting
Asynchronous versus synchronous
Security considerations
Conclusion
Summary
Further reading
10. Risk Management and Policy Considerations
Information Included in This Chapter
Introduction
Risk management
Security policies
Conclusion
Summary
Further reading
11. Future Technology
Information Included in This Chapter
Introduction
Pushing into the cloud
Ubiquitous broadband
Wearable computing
Interfaces
HTML5
Consumers as producers
Conclusion
Summary
Further reading
12. Pulling It All Together
Information Included in This Chapter
Introduction
Background
Requirements
Messaging
Storage
Project management
Source control
Customer relations
Conclusion
Summary
Index
- Edition: 1
- Published: April 7, 2014
- No. of pages (Paperback): 242
- No. of pages (eBook): 242
- Imprint: Syngress
- Language: English
- Paperback ISBN: 9780124170407
- eBook ISBN: 9780124171237
RM
Ric Messier
GSEC, CEH, CISSP, WasHere Consulting, Instructor, Graduate Professional Studies, Brandeis University and Champlain College Division of Information Technology & Sciences
Affiliations and expertise
GSEC, CEH, CISSP, WasHere Consulting, Instructor, Graduate Professional Studies, Brandeis University and Champlain College Division of Information Technology & SciencesRead Collaboration with Cloud Computing on ScienceDirect