You are previewing Collaboration with Cloud Computing.
O'Reilly logo
Collaboration with Cloud Computing

Book Description

Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions.

Table of Contents

  1. Cover image
  2. Title page
  3. Copyright
  4. Dedication
  5. Preface
    1. Intended audience
    2. Organization of this book
  6. Acknowledgements
  7. Chapter 1. The Evolving Nature of Information Security
    1. Information Included in This Chapter
    2. Introduction
    3. History of the Internet
    4. Significant security events
    5. Evolution of services
    6. Today’s risks (in a Nutshell)
    7. Collaboration
    8. Conclusion
    9. Summary
  8. Chapter 2. Cloud Computing
    1. Information Included in This Chapter
    2. Introduction
    3. The protocols that made it possible
    4. The cloud
    5. Unified communication as a service
    6. Public, private, or hybrid
    7. Conclusion
    8. Summary
  9. Chapter 3. Software as a Service
    1. Information Included in This Chapter
    2. Introduction
    3. Contact lists
    4. Documents on the go
    5. Advantages
    6. Security considerations
    7. Conclusion
    8. Summary
  10. Chapter 4. Storage in the Cloud
    1. Information Included in This Chapter
    2. Introduction
    3. Uses of cloud storage
    4. Security
    5. Protecting yourself
    6. Conclusion
    7. Summary
    8. Further reading
  11. Chapter 5. Virtual Servers and Platform as a Service
    1. Information Included in This Chapter
    2. Introduction
    3. History of virtualization
    4. How virtualization works
    5. Platform as a service
    6. Security considerations
    7. Conclusion
    8. Summary
  12. Chapter 6. Social Media
    1. Information Included in This Chapter
    2. Introduction
    3. History and impact of social networking
    4. Social networking sites
    5. Crowdsourcing
    6. Gamification
    7. Human resources
    8. Security considerations
    9. Conclusion
    10. Summary
    11. Further reading
  13. Chapter 7. Mobile Computing
    1. Information Included in This Chapter
    2. Introduction
    3. Smartphones
    4. Providing mobile access
    5. Physical security
    6. Bring your own device
    7. Conclusion
    8. Summary
    9. Further reading
  14. Chapter 8. Unified Communications
    1. Information Included in This Chapter
    2. Introduction
    3. Signaling
    4. H.323
    5. Session initiation protocol
    6. Unified communications
    7. VoIP in the cloud
    8. Security considerations
    9. Conclusion
    10. Summary
  15. Chapter 9. Remote Workers
    1. Information Included in This Chapter
    2. Introduction
    3. Remote workers
    4. Pros and cons of telecommuting
    5. Asynchronous versus synchronous
    6. Security considerations
    7. Conclusion
    8. Summary
    9. Further reading
  16. Chapter 10. Risk Management and Policy Considerations
    1. Information Included in This Chapter
    2. Introduction
    3. Risk management
    4. Security policies
    5. Conclusion
    6. Summary
    7. Further reading
  17. Chapter 11. Future Technology
    1. Information Included in This Chapter
    2. Introduction
    3. Pushing into the cloud
    4. Ubiquitous broadband
    5. Wearable computing
    6. Interfaces
    7. HTML5
    8. Consumers as producers
    9. Conclusion
    10. Summary
    11. Further reading
  18. Chapter 12. Pulling It All Together
    1. Information Included in This Chapter
    2. Introduction
    3. Background
    4. Requirements
    5. Messaging
    6. Storage
    7. Project management
    8. Source control
    9. Customer relations
    10. Conclusion
    11. Summary
  19. Index