Download Bring your own Device: Einsatz von privaten Endgeräten im by Andreas Kohne,Sonja Ringleb,Cengizhan Yücel PDF

By Andreas Kohne,Sonja Ringleb,Cengizhan Yücel

Das Buch betrachtet das Thema BYOD (Bring your personal equipment) ganzheitlich – ausgehend von einer Mobile-Strategie im Unternehmen werden alle relevanten Aspekte wie rechtliche Rahmenbedingungen, Sicherheitsrisiken und deren Behandlung, technische Voraussetzungen (Software, IT-Infrastruktur, Support), Einführungs- und Betriebskosten, Erreichbarkeit und Collaboration sowie soziale Aspekte, Unternehmenspolitik und die Implementierung von BYOD beleuchtet. Damit wird dem zunehmenden pattern zur Nutzung von privaten, mobilen Endgeräten im beruflichen Umfeld Rechnung getragen.

Praxisnah befassen sich die Autoren mit Problemen und Fragestellungen rund um die Integration von privaten Endgeräten in die IT-Infrastruktur des Arbeitgebers und liefern konkrete Herangehensweisen, Empfehlungen und Best-Practices für die Planung, Prüfung und Umsetzung  einer BYOD -Strategie.

Das Buch hilft allen, die eine Einführung von BYOD in ihrem Betrieb prüfen, zu einem umfassenden Verständnis von Chancen und möglichen Risiken, aber auch von Alternativen zu gelangen.

Show description

Read or Download Bring your own Device: Einsatz von privaten Endgeräten im beruflichen Umfeld – Chancen, Risiken und Möglichkeiten (German Edition) PDF

Similar general books

Computer Science and its Applications: CSA 2012: 203 (Lecture Notes in Electrical Engineering)

The 4th FTRA foreign convention on desktop technological know-how and its purposes (CSA-12) may be held in Jeju, Korea on November 22~25, 2012. CSA-12 stands out as the such a lot entire convention enthusiastic about a few of the facets of advances in desktop technological know-how and its applications. CSA-12 will provide a chance for tutorial and execs to debate the most recent matters and development within the zone of CSA.

Rapid BeagleBoard Prototyping with MATLAB and Simulink

In DetailAs an open resource embedded single-board desktop with many typical interfaces, Beagleboard is perfect for construction embedded audio/video structures to achieve your useful principles. The problem is how you can layout and enforce an excellent electronic processing set of rules on Beagleboard quick and simply with out extensive low-level coding.

Hardware Security: Design, Threats, and Safeguards

Starting with an advent to cryptography, defense: layout, Threats, and Safeguards explains the underlying mathematical ideas had to layout advanced cryptographic algorithms. It then offers effective cryptographic set of rules implementation tools, besides cutting-edge examine and methods for the layout of very huge scale built-in (VLSI) circuits and symmetric cryptosystems, whole with examples of complicated Encryption typical (AES) ciphers, uneven ciphers, and elliptic curve cryptography (ECC).

Big Data Analytics and Knowledge Discovery: 19th International Conference, DaWaK 2017, Lyon, France, August 28–31, 2017, Proceedings (Lecture Notes in Computer Science)

This ebook constitutes the refereed court cases of the nineteenth International Conference on tremendous info Analytics and information Discovery, DaWaK 2017, held in Lyon, France, in August 2017. The 24 revised complete papers and eleven brief papers offered have been conscientiously reviewed and selected from ninety seven submissions. The papers are geared up within the following topical sections: new iteration information warehouses layout; cloud and NoSQL databases; complex programming paradigms; non-functional requisites delight; computing device studying; social media and twitter research; sentiment research and person effect; wisdom discovery;  and facts move administration and optimization.

Extra resources for Bring your own Device: Einsatz von privaten Endgeräten im beruflichen Umfeld – Chancen, Risiken und Möglichkeiten (German Edition)

Sample text

Download PDF sample

Rated 4.12 of 5 – based on 50 votes