ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Bring your own devices (BYOD) survival guide

دانلود کتاب راهنمای بقای دستگاه های خود (BYOD) را به همراه داشته باشید

Bring your own devices (BYOD) survival guide

مشخصات کتاب

Bring your own devices (BYOD) survival guide

ویرایش:  
نویسندگان:   
سری:  
ISBN (شابک) : 1466565047, 9781466565043 
ناشر: Taylor & Francis 
سال نشر: 2013 
تعداد صفحات: 443 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 24 مگابایت 

قیمت کتاب (تومان) : 40,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 5


در صورت تبدیل فایل کتاب Bring your own devices (BYOD) survival guide به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب راهنمای بقای دستگاه های خود (BYOD) را به همراه داشته باشید نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب راهنمای بقای دستگاه های خود (BYOD) را به همراه داشته باشید

این کتاب توضیح می‌دهد و سپس به خوانندگان کمک می‌کند تا با پدیده روانی-تکنویی که فناوری خود را بیاورید (BYOT) زندگی کنند. خوانندگان یاد خواهند گرفت که چگونه این کاربران نهایی جدید و خواسته های آنها و همچنین پیامدهای استراتژیک و تاکتیکی این خواسته ها را درک کنند. در مرحله بعد، طیف گسترده ای از ملاحظات فنی مانند انتخاب، اتصال، آموزش، پشتیبانی و امنیت را پوشش می دهد. این متن شامل بهترین رویه ها و مطالعات موردی شرکت های معروف، از جمله IBM، Ford، و CarFax می باشد"-- بیشتر بخوانید...


توضیحاتی درمورد کتاب به خارجی

''This book explains and then helps readers live with the psycho-techno phenomenon that is bring your own technology (BYOT). Readers will learn how to understand these new end-users and their demands, as well as the strategic and tactical ramifications of these demands. Next, it covers the broad range of technical considerations such as selection, connectivity, training, support, and security. The text includes best practices and case studies of well-known companies, including IBM, Ford, and CarFax''-- Read more...



فهرست مطالب


Content: The BYOD Revolution What\'s in It for the Organization? So, What Can Go Wrong? Mobile Device Management Consumerization of IT Business as Usual Making a Financial Case for BYOD Supporting BYOD Cost-Benefit Analysis Break-Even Analysis Estimating ROI for an IT Project Earned-Value Management Rapid Economic Justification Value Measuring Methodology Step 1: Develop a Decision Framework Task 1-Identify and Define Value Structure Task 2-Identify and Define Risk Structure Task 3-Identify and Define Cost Structure Task 4-Begin Documentation Step 2: Alternative Analysis-Estimate Value, Costs, and Risk Task 1-Identify and Define Alternatives Task 2-Estimate Value and Cost Task 3-Conduct Risk Analysis Task 4-Ongoing Documentation Step 3: Pull Together the Information Task 1-Aggregate the Cost Estimate Task 2-Calculate the Return on Investment Task 3-Calculate the Value Score Task 4-Calculate the Risk Scores Task 5-Compare Value, Cost, and Risk Step 4: Communicate and Document Task 1-Communicate Value to Customers and Stakeholders Task 2-Prepare Budget Justification Documents Task 3-Satisfy Ad Hoc Reporting Requirements Task 4-Use Lessons Learned to Improve Processes Uncertainty Analysis Sensitivity Analysis Glossary Reference Integrating BYOD into Performance Measurement and Management Systems Why Measure? Understanding Performance Management Define Organizational Vision, Mission, and Strategy Develop Performance Objectives, Measures, and Goals Give Measures Time to Evolve Attributes of Successful Performance Measurement Systems Developing Benchmarks Plan Collect Analyze Adapt Using Balanced Scorecard to Measure BYOD Effectiveness Representative IT Balanced Scorecard Value Metrics Keeping Track of What\'s Going On Validation and Verification References Assessment and Mitigation of Risks in a BYOD Environment Initiating the Risk Assessment A Typical Organization\'s Computer System System Architecture System Operational Authority/Ownership Threats to A Typical Organization\'s Assets Current Security Measures COG Contingency Planning Divisional Contingency Planning Protection against Network-Related Threats Vulnerabilities Reported by the Risk Assessment Team Recommendations for Mitigating the Identified Vulnerabilities Summary Reference Guidelines for Managing and Securing Mobile Devices in the Enterprise Mobile Device Overview High-Level Threats and Vulnerabilities Use of Untrusted Mobile Devices and Networks Use of Applications Created by Unknown Parties Interaction with Other Systems Use of Untrusted Content Use of Location Services Technologies for Mobile Device Management Components and Architectures Capabilities General Policy Data Communication and Storage User and Device Authentication Applications Security for the Enterprise Mobile Device Solution Life Cycle Initiation Development Implementation Operations and Maintenance Disposal Case Study Cloud Best Practices Selecting a Cloud Service CSP and End-User Agreements Terms of Service Agreements Non-Disclosure Agreements Service Level Agreements Terms and Definitions Measuring SLA Performance SLA Enforcement Mechanisms CSP, Organization, and Integrator Roles and Responsibilities Contracting with Integrators Clearly Defined Roles and Responsibilities Standards Security Continuous Monitoring Incident Response Key Escrow Forensics Audit Logs Privacy Impact Assessments (PIA) Data Location Breach Response Reference Configuration Management in a BYOD Environment CM and Process Improvement Measurement and Metrics Benefits of BYOD CM CM Components Configuration Identification Configuration Change Control Configuration Status Accounting Configuration Auditing Implementing CM in the Organization Manage the Risks of CM Configuration Management and Data Management Document Identification Data Status Level Management Data and Product Configuration Relationships Data Version Control Digital Data Transmittal Data Access Control Content Management, Mobile, and Otherwise Content Management System (CMS) Document Management Systems/Electronic Document Management Systems (DMS/EDMS) Records Management Systems (RMS) Reliability Authenticity Integrity Usability What Are the Records Management Risks Associated with Websites? Digital Asset Management (DAM) Mobile Device Management and Mobile Content Management (MDM/MCM) Integrating BYOD into Resource Management Data Management Roles Data Sponsor Data Steward Data Administration Database Administration System Administration and System Support Data Management Responsibilities Development and Management Requirements Identification and Enforcement Standards, Design, and Implementation Data and Mapping Standards Quality Control, Data Integrity, and Backup/Recovery Data Sharing Change Management and Impact Analysis Connectivity Input and Update Security Metadata Training Guidelines Guideline 1 Guideline 2 Guideline 3 Guideline 4 Guideline 5 Guideline 6 Guideline 7 Guideline 8 Guideline 9 Guideline 10 Guideline 11 Guideline 12 Guideline 13 Guideline 14 Guideline 15 Guideline 16 Guideline 17 Glossary of Data Management Terms BYOD Means Social Networking Tools That Provide Networking Capabilities Wikis in Action Meaning-Based Computing Semantic Web Virtual Worlds Knowledge Management Tools Mashups References Quick Start 1: Software-Based Authentication Procedures/Issues/Policies Bibliography Quick Start 2: BYOD: Making It Work for Your Firm Procedures/Issues/Policies Bibliography Quick Start 3: Software Selection from Multiple Packages Procedures/Issues/Policies Bibliography Quick Start 4: The Make-Buy Decision Procedures/Issues/Policies Bibliography Quick Start 5: Balanced Scorecard Metrics Quick Start 6: Common BYOD Mistakes Procedures/Issues/Policies Bibliography Quick Start 7: BYOD Corporate Policy Procedures/Issues/Policies Bibliography Quick Start 8: Mobile Device Management Functionality Guide Procedures/Issues/Policies Bibliography Quick Start 9: Legal Issues with BYOD Procedures/Issues/Policies The Fixes: How to Inoculate Your Company against Potential Legal Trouble Bibliography Quick Start 10: Managing Online Content Checklist Procedures/Issues/Policies General Content Management Issues Bibliography Quick Start 11: Selecting a Content Management System Checklist Procedures/Issues/Policies Before You Start Determining Project Goals and Targets Determining and Documenting Business Requirements Producing Documentation Evaluating and Selecting a CMS Bibliography Quick Start 12: BYOD Lessons Learned Procedures/Issues/Policies Each Unique Survey...Survey...Survey Clarity Each and Every Platform Should Be IT\'s BFF The App Store Problem Virtualization: Might It Be a Temporary Savior? Bibliography Quick Start 13: BYOD Risks Procedures/Issues/Policies Bibliography Quick Start 14: Getting Started with BYOD Procedures/Issues/Policies Bibliography Quick Start 15: BYOD Security Tips Procedures/Issues/Policies Bibliography Quick Start 16: Cloud Migration Tips Procedures/Issues/Policies Bibliography Quick Start 17: Hitching Your Network to BYOD Procedures/Issues/Policies Bibliography Appendix A: Security Glossary Appendix B: Employee Mobile Device Agreement Appendix C: Mobile Device Security Checklist Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices Appendix E: Traditional IT Metrics Reference Appendix F: Cloud Procurement Questions Appendix G: Computer Use Policy Acknowledgment Appendix H: Benchmarking Data Collection Methods Appendix I: Wireless Device Agreement Appendix J: Mobile Device Management Vendors Appendix K: Best Practices Security Checklist Index
Abstract: \'\'This book explains and then helps readers live with the psycho-techno phenomenon that is bring your own technology (BYOT). Readers will learn how to understand these new end-users and their demands, as well as the strategic and tactical ramifications of these demands. Next, it covers the broad range of technical considerations such as selection, connectivity, training, support, and security. The text includes best practices and case studies of well-known companies, including IBM, Ford, and CarFax\'\'




نظرات کاربران