35986841_10216840653711318_1105697261150535680_n

Collaboration with cloud computing : (Record no. 1838)

MARC details
000 -LEADER
fixed length control field 02721cam a2200373 i 4500
001 - CONTROL NUMBER
control field 18076515
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20181206112606.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140321s2014 ne a b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2014003523
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780124170407 (paperback)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
Modifying agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number .M4864 2014
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.678
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Messier, Ric.
245 10 - TITLE STATEMENT
Title Collaboration with cloud computing :
Remainder of title security, social media, and unified communications /
Statement of responsibility, etc Ric Messier.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Amsterdam ; Boston :
Name of publisher, distributor, etc Syngress,
Date of publication, distribution, etc 2014
300 ## - PHYSICAL DESCRIPTION
Extent xix, 222 pages :
Other physical details illustrations ;
Dimensions 24 cm
336 ## - CONTENT TYPE
Content Type Term text
Source rdacontent
337 ## - MEDIA TYPE
Media Type Term unmediated
Source rdamedia
338 ## - CARRIER TYPE
Carrier Type Term volume
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Machine generated contents note: 1. The Evolving Nature of Information Management Security 2. Cloud Computing 3. Software as a Service 4. Storage in the Cloud 5. Virtual Servers 6. Social Media Risks & Rewards 7. VOIP and Its Risks 8. The Risks and Rewards of Remote Workers 9. Policy Considerations 10. Risk Management 11. New Technologies and Being Agile 12. Future Trends and Outcomes.
520 ## - SUMMARY, ETC.
Summary, etc "It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of the activities"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information technology
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information technology
General subdivision Management.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cloud computing.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes
General subdivision Prevention.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Centeral Library Centeral Library Second Floor - Computer Sciences 16.11.2016   004.678 M.R.C 2014 23990 16.11.2016 16.11.2016 Books