Cargando…

Bring your own devices (BYOD) survival guide /

"This book explains and then helps readers live with the psycho-techno phenomenon that is bring your own technology (BYOT). Readers will learn how to understand these new end-users and their demands, as well as the strategic and tactical ramifications of these demands. Next, it covers the broad...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Keyes, Jessica, 1950-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton, FL : Taylor & Francis, 2013.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • 1.
  • The BYOD Revolution
  • 2.
  • Making a Financial Case for BYOD
  • 3.
  • Integrating BYOD into Performance Measurement and Management Systems
  • 4.
  • Assessment and Mitigation of Risks in a BYOD Environment
  • 5.
  • Guidelines for Managing and Securing Mobile Devices in the Enterprise
  • 6.
  • Cloud Best Practices
  • 7.
  • Configuration Management in a BYOD Environment
  • 8.
  • Content Management, Mobile and Otherwise
  • 9.
  • Integrating BYOD into Resource Management
  • 10.
  • BYOD Means Social Networking
  • Quick Start 1. Software-Based Authentication
  • Quick Start 2. BYOD: Making It Work for Your Firm
  • Quick Start 3. Software Selection from Multiple Packages
  • Quick Start 4. The Make-Buy Decision
  • Quick Start 5. Balanced Scorecard Metrics
  • Quick Start 6. Common BYOD Mistakes
  • Quick Start 7. BYOD Corporate Policy
  • Quick Start 8. Mobile Device Management Functionality Guide
  • Quick Start 9. Legal Issues with BYOD
  • Quick Start 10. Managing Online Content Checklist
  • Quick Start 11. Selecting a Content Management System Checklist
  • Quick Start 12. BYOD Lessons Learned
  • Quick Start 13. BYOD Risks
  • Quick Start 14. Getting Started with BYOD
  • Quick Start 15. BYOD Security Tips
  • Quick Start 16. Cloud Migration Tips
  • Quick Start 17. Hitching Your Network to BYOD
  • Appendix A. Security Glossary
  • Appendix B. Employee Mobile Device Agreement
  • Appendix C. Mobile Device Security Checklist
  • Appendix D. Security Configuration Recommendations for Apple iOS 5 Devices
  • Appendix E. Traditional IT Metrics Reference
  • Appendix F. Cloud Procurement Questions
  • Appendix G. Computer Use Policy
  • Appendix H. Benchmarking Data Collection Methods
  • Appendix I. Wireless Device Agreement
  • Appendix J. Mobile Device Management Vendors
  • Appendix K. Best Practices Security Checklist.