• صفحه اصلی
  • جستجوی پیشرفته
  • فهرست کتابخانه ها
  • درباره پایگاه
  • ارتباط با ما
  • تاریخچه

عنوان
Bring Your Own Devices (BYOD) Survival Guide

پدید آورنده
Jessica Keyes

موضوع

رده
QA76
.
9
.
T43
J477
2016

کتابخانه
مرکز و کتابخانه مطالعات اسلامی به زبان‌های اروپایی

محل استقرار
استان: قم ـ شهر: قم

مرکز و کتابخانه مطالعات اسلامی به زبان‌های اروپایی

تماس با کتابخانه : 32910706-025

شابک

شابک
1466565047
شابک
9781466565043

شماره کتابشناسی ملی

شماره
b546986

عنوان و نام پديدآور

عنوان اصلي
Bring Your Own Devices (BYOD) Survival Guide
نام عام مواد
[Book]
نام نخستين پديدآور
Jessica Keyes

وضعیت ویراست

وضعيت ويراست
1st ed

وضعیت نشر و پخش و غیره

نام ناشر، پخش کننده و غيره
Boca Raton CRC Press [Ann Arbor, Michigan] [ProQuest]
تاریخ نشرو بخش و غیره
2016

مشخصات ظاهری

نام خاص و کميت اثر
1(443 pages)

یادداشتهای مربوط به خلاصه یا چکیده

متن يادداشت
The BYOD RevolutionWhat's in It for the Organization? So, What Can Go Wrong? Mobile Device Management Consumerization of IT Business as UsualMaking a Financial Case for BYOD Supporting BYOD Cost-Benefit Analysis Break-Even Analysis Estimating ROI for an IT Project Earned-Value Management Rapid Economic Justification Value Measuring Methodology Step 1: Develop a Decision Framework Task 1-Identify and Define Value Structure Task 2-Identify and Define Risk Structure Task 3-Identify and Define Cost Structure Task 4-Begin Documentation Step 2: Alternative Analysis-Estimate Value, Costs, and Risk Task 1-Identify and Define Alternatives Task 2-Estimate Value and Cost Task 3-Conduct Risk Analysis Task 4-Ongoing Documentation Step 3: Pull Together the Information Task 1-Aggregate the Cost Estimate Task 2-Calculate the Return on Investment Task 3-Calculate the Value Score Task 4-Calculate the Risk Scores Task 5-Compare Value, Cost, and Risk Step 4: Communicate and Document Task 1-Communicate Value to Customers and Stakeholders Task 2-Prepare Budget Justification Documents Task 3-Satisfy Ad Hoc Reporting Requirements Task 4-Use Lessons Learned to Improve Processes Uncertainty Analysis Sensitivity AnalysisGlossaryReferenceIntegrating BYOD into Performance Measurement and Management SystemsWhy Measure?Understanding Performance Management Define Organizational Vision, Mission, and Strategy Develop Performance Objectives, Measures, and Goals Give Measures Time to EvolveAttributes of Successful Performance Measurement SystemsDeveloping Benchmarks Plan Collect Analyze AdaptUsing Balanced Scorecard to Measure BYOD EffectivenessRepresentative IT...Balanced Scorecard Value MetricsKeeping Track of What's Going OnValidation and VerificationReferencesAssessment and Mitigation of Risks in a BYOD EnvironmentInitiating the Risk AssessmentA Typical Organization's Computer SystemSystem ArchitectureSystem Operational Authority/OwnershipThreats to A Typical Organization's AssetsCurrent Security MeasuresCOG Contingency PlanningDivisional Contingency PlanningProtection against Network-Related ThreatsVulnerabilities Reported by the Risk Assessment TeamRecommendations for Mitigating the Identified VulnerabilitiesSummaryReferenceGuidelines for Managing and Securing Mobile Devices in the EnterpriseMobile Device OverviewHigh-Level Threats and VulnerabilitiesUse of Untrusted Mobile Devices and NetworksUse of Applications Created by Unknown PartiesInteraction with Other SystemsUse of Untrusted ContentUse of Location ServicesTechnologies for Mobile Device Management Components and ArchitecturesCapabilities General Policy Data Communication and Storage User and Device Authentication ApplicationsSecurity for the Enterprise Mobile Device Solution Life Cycle Initiation Development Implementation Operations and Maintenance DisposalCase StudyCloud Best PracticesSelecting a Cloud ServiceCSP and End-User Agreements Terms of Service Agreements Non-Disclosure Agreements Service Level Agreements Terms and Definitions Measuring SLA Performance SLA Enforcement MechanismsCSP, Organization, and Integrator Roles and Responsibilities Contracting with Integrators Clearly Defined Roles and ResponsibilitiesStandardsSecurity Continuous Monitoring Incident Response Key Escrow Forensics Audit Logs Privacy Impact Assessments (PIA) Data Location Breach ResponseReferenceConfiguration Management in a BYOD EnvironmentCM and ProcessImprovementMeasurement and MetricsBenefits of BYOD CMCM ComponentsConfiguration IdentificationConfiguration Change ControlConfiguration Status AccountingConfiguration AuditingImplementing CM in the OrganizationManage the Risks of CMConfiguration Management and Data Management Document Identification Data Status Level Management Data and Product Configuration Relationships Data Version Control Digital Data Transmittal Data Access ControlContent Management, Mobile, and OtherwiseContent Management System (CMS)Document Management Systems/Electronic Document Management Systems (DMS/EDMS)Records Management Systems (RMS) Reliability Authenticity Integrity Usability What Are the Records Management Risks Associated with Websites?Digital Asset Management (DAM)Mobile Device Management and Mobile Content Management (MDM/MCM)Integrating BYOD into Resource ManagementData Management Roles Data Sponsor Data Steward Data Administration Database Administration System Administration and System SupportData Management Responsibilities Development and Management Requirements Identification and Enforcement Standards, Design, and Implementation Data and Mapping Standards Quality Control, Data Integrity, and Backup/Recovery Data Sharing Change Management and Impact Analysis Connectivity Input and Update Security Metadata TrainingGuidelines Guideline 1 Guideline 2 Guideline 3 Guideline 4 Guideline 5 Guideline 6 Guideline 7 Guideline 8 Guideline 9 Guideline 10 Guideline 11 Guideline 12 Guideline 13 Guideline 14 Guideline 15 Guideline 16 Guideline 17Glossary of Data Management TermsBYOD Means Social Networking Tools That Provide Networking Capabilities Wikis in Action Meaning-BasedComputing Semantic Web Virtual Worlds Knowledge Management Tools Mashups ReferencesQuick Start 1: Software-Based Authentication Procedures/Issues/Policies BibliographyQuick Start 2: BYOD: Making It Work for Your Firm Procedures/Issues/Policies BibliographyQuick Start 3: Software Selection from Multiple Packages Procedures/Issues/Policies BibliographyQuick Start 4: The Make-Buy Decision Procedures/Issues/Policies BibliographyQuick Start 5: Balanced Scorecard MetricsQuick Start 6: Common BYOD Mistakes Procedures/Issues/Policies BibliographyQuick Start 7: BYOD Corporate Policy Procedures/Issues/Policies BibliographyQuick Start 8: Mobile Device Management Functionality Guide Procedures/Issues/Policies BibliographyQuick Start 9: Legal Issues with BYOD Procedures/Issues/Policies The Fixes: How to Inoculate Your Company against Potential Legal Trouble BibliographyQuick Start 10: Managing Online Content Checklist Procedures/Issues/Policies General Content Management IssuesBibliographyQuick Start 11: Selecting a Content Management System Checklist Procedures/Issues/Policies Before You Start Determining Project Goals and Targets Determining and Documenting Business Requirements Producing Documentation Evaluating and Selecting a CMSBibliographyQuick Start 12: BYOD Lessons Learned Procedures/Issues/Policies Each Unique Survey...Survey...Survey Clarity Each and Every Platform Should Be IT's BFF The App Store Problem Virtualization: Might It Be a Temporary Savior?BibliographyQuick Start 13: BYOD Risks Procedures/Issues/Policies BibliographyQuick Start 14: Getting Started with BYOD Procedures/Issues/Policies BibliographyQuick Start 15: BYOD Security Tips Procedures/Issues/Policies

رده بندی کنگره

شماره رده
QA76
.
9
.
T43
نشانه اثر
J477
2016

نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )

مستند نام اشخاص تاييد نشده
Jessica Keyes

نام شخص - (مسئولیت معنوی برابر )

مستند نام اشخاص تاييد نشده
Jessica Keyes

دسترسی و محل الکترونیکی

نام الکترونيکي
 مطالعه متن کتاب 

اطلاعات رکورد کتابشناسی

نوع ماده
[Book]

اطلاعات دسترسی رکورد

تكميل شده
Y

پیشنهاد / گزارش اشکال

اخطار! اطلاعات را با دقت وارد کنید
ارسال انصراف
این پایگاه با مشارکت موسسه علمی - فرهنگی دارالحدیث و مرکز تحقیقات کامپیوتری علوم اسلامی (نور) اداره می شود
مسئولیت صحت اطلاعات بر عهده کتابخانه ها و حقوق معنوی اطلاعات نیز متعلق به آنها است
برترین جستجوگر - پنجمین جشنواره رسانه های دیجیتال