MARC details
000 -LEADER |
fixed length control field |
02721cam a2200373 i 4500 |
001 - CONTROL NUMBER |
control field |
18076515 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20181206112606.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
140321s2014 ne a b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2014003523 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780124170407 (paperback) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Description conventions |
rda |
Modifying agency |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
.M4864 2014 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
004.678 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Messier, Ric. |
245 10 - TITLE STATEMENT |
Title |
Collaboration with cloud computing : |
Remainder of title |
security, social media, and unified communications / |
Statement of responsibility, etc |
Ric Messier. |
250 ## - EDITION STATEMENT |
Edition statement |
1st ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Amsterdam ; Boston : |
Name of publisher, distributor, etc |
Syngress, |
Date of publication, distribution, etc |
2014 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xix, 222 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm |
336 ## - CONTENT TYPE |
Content Type Term |
text |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media Type Term |
unmediated |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier Type Term |
volume |
Source |
rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Machine generated contents note: 1. The Evolving Nature of Information Management Security 2. Cloud Computing 3. Software as a Service 4. Storage in the Cloud 5. Virtual Servers 6. Social Media Risks & Rewards 7. VOIP and Its Risks 8. The Risks and Rewards of Remote Workers 9. Policy Considerations 10. Risk Management 11. New Technologies and Being Agile 12. Future Trends and Outcomes. |
520 ## - SUMMARY, ETC. |
Summary, etc |
"It may seem a strange place to start, but a good beginning here is the Boston Marathon bombings in April, 2013 and the days that followed. In particular, the Friday when officials shut down the city of Boston and neighboring communities. Businesses all over the city were forced to shut down while the manhunt took place over the course of the day on Friday. While retail establishments were really out of luck because no one on the streets meant no one in the stores, other businesses were able to continue to operate because of a number of technologies that allowed remote workers to get access to their files, the systems they needed and their phone systems. Any business that implemented a full Unified Communications (UC) solution could have employees also communicating with instant messaging and know who was on-line because of the presence capabilities. Additionally, news of the events spread quickly and less because of news outlets who were, quite rightly, not allowed to provide specifics about many of the activities"-- |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Information technology |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Information technology |
General subdivision |
Management. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Cloud computing. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer crimes |
General subdivision |
Prevention. |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Item type |
Books |