|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
SCIDIR_ocn840413884 |
003 |
OCoLC |
005 |
20231117044850.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
130422s2013 enk ob 000 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e pn
|c OPELS
|d N$T
|d IDEBK
|d E7B
|d TEFOD
|d YDXCP
|d TPH
|d OCLCF
|d UPM
|d GGVRL
|d UKDOC
|d OCLCQ
|d OCLCO
|d OCLCQ
|d UIU
|d CDX
|d DEBSZ
|d MHW
|d MEAUC
|d CNSPO
|d OCLCO
|d TEFOD
|d OCLCQ
|d OCLCO
|d OCLCQ
|d MERUC
|d OCLCQ
|d UUM
|d U3W
|d D6H
|d AU@
|d OCLCQ
|d OTZ
|d WYU
|d XC$
|d AUD
|d LEAUB
|d VLY
|d S2H
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 841907933
|a 857902886
|a 864425601
|a 1162056447
|
020 |
|
|
|a 9780124116108
|q (electronic bk.)
|
020 |
|
|
|a 0124116108
|q (electronic bk.)
|
020 |
|
|
|z 9780124115927
|
020 |
|
|
|z 0124115926
|
020 |
|
|
|a 1299403093
|
020 |
|
|
|a 9781299403093
|
035 |
|
|
|a (OCoLC)840413884
|z (OCoLC)841907933
|z (OCoLC)857902886
|z (OCoLC)864425601
|z (OCoLC)1162056447
|
050 |
|
4 |
|a HD30.2
|b .H39 2013
|
060 |
|
4 |
|a Online Book
|
072 |
|
7 |
|a COM
|x 013000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 014000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 018000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 067000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 037000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 052000
|2 bisacsh
|
082 |
0 |
4 |
|a 004
|2 23
|
100 |
1 |
|
|a Hayes, Bob E.,
|d 1963-
|
245 |
1 |
0 |
|a Bring your own device (BYOD) to work :
|b trend report /
|c Bob Hayes, Kathleen Kotwica.
|
260 |
|
|
|a Oxford ;
|a Waltham, Mass. :
|b Elsevier,
|c �2013.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Risk management portfolio
|
520 |
|
|
|a Bring Your Own Device (BYOD) to Work examines the emerging BYOD (Bring Your Own Device to work) trend in corporate IT. BYOD is the practice of employees bringing personally-owned mobile devices (e.g., smartphones, tablets, laptops) to the workplace, and using those devices to access company resources such as email, file servers, and databases. BYOD presents unique challenges in data privacy, confidentiality, security, productivity, and acceptable use that must be met proactively by information security professionals. This report provides solid background on the practice, original research on its pros and cons, and actionable recommendations for implementing a BYOD program. Successful programs are cross-functional efforts including information technology, human resources, finance, legal, security, and business operating teams. This report is a valuable resource to any security professional considering a BYOD program. Presents research data associated with BYOD and productivity in the workplace. Describes BYOD challenges, risks, and liabilities. Makes recommendations for the components a clearly communicated BYOD program should contain.
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a 1.1. Productivity -- 1.2. Pros and cons -- 1.3. Must-haves -- 1.4. Challenges -- 1.5. Risks and liabilities.
|
588 |
0 |
|
|a Print version record.
|
546 |
|
|
|a English.
|
650 |
|
0 |
|a Information technology
|x Management.
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Access control.
|
650 |
|
0 |
|a Mobile computing.
|
650 |
|
6 |
|a Technologie de l'information
|x Gestion.
|0 (CaQQLa)000264687
|
650 |
|
6 |
|a Technologie de l'information
|0 (CaQQLa)201-0023285
|x S�ecurit�e
|0 (CaQQLa)201-0373949
|x Mesures.
|0 (CaQQLa)201-0373949
|
650 |
|
6 |
|a Informatique mobile.
|0 (CaQQLa)201-0274402
|
650 |
|
7 |
|a COMPUTERS
|x Computer Literacy.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Computer Science.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Data Processing.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Hardware
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Information Technology.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Machine Theory.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Reference.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Access control
|2 fast
|0 (OCoLC)fst00872298
|
650 |
|
7 |
|a Information technology
|x Management
|2 fast
|0 (OCoLC)fst00973112
|
650 |
|
7 |
|a Information technology
|x Security measures
|2 fast
|0 (OCoLC)fst00973129
|
650 |
|
7 |
|a Mobile computing
|2 fast
|0 (OCoLC)fst01024221
|
700 |
1 |
|
|a Kotwica, Kathleen.
|
776 |
|
|
|z 0-12-411592-6
|
830 |
|
0 |
|a Security Executive Council risk management portfolio.
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780124115927
|z Texto completo
|