Bring Your Own Devices (BYOD) Survival Guide
eBook - ePub

Bring Your Own Devices (BYOD) Survival Guide

  1. 451 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Bring Your Own Devices (BYOD) Survival Guide

Book details
Table of contents
Citations

About This Book

Where end-users once queued up to ask the IT department for permission to buy a new computer or a new version of software, they are now bypassing IT altogether and buying it on their own. From laptops and smartphones to iPads and virtually unlimited software apps, end-users have tasted their freedom and love it. IT will simply never be the same.Bri

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Bring Your Own Devices (BYOD) Survival Guide by Jessica Keyes in PDF and/or ePUB format, as well as other popular books in Business & Operations. We have over one million books available in our catalogue for you to explore.

Information

Year
2016
ISBN
9781482209730
Edition
1
Subtopic
Operations

Table of contents

  1. Cover
  2. Half Title
  3. Title Page
  4. Copyright Page
  5. Table of Contents
  6. Preface
  7. About the Author
  8. Chapter 1 The BYOD Revolution
  9. Chapter 2 Making a Financial Case for BYOD
  10. Chapter 3 Integrating BYOD into Performance Measurement and Management Systems
  11. Chapter 4 Assessment and Mitigation of Risks in a BYOD Environment
  12. Chapter 5 Guidelines for Managing and Securing Mobile Devices in the Enterprise
  13. Chapter 6 Cloud Best Practices
  14. Chapter 7 Configuration Management in a BYOD Environment
  15. Chapter 8 Content Management, Mobile and Otherwise
  16. Chapter 9 Integrating BYOD into Resource Management
  17. Chapter 10 BYOD Means Social Networking
  18. Quick Start 1 Software-Based Authentication
  19. Quick Start 2 BYOD: Making It Work for Your Firm
  20. Quick Start 3 Software Selection from Multiple Packages
  21. Quick Start 4 The Make-Buy Decision
  22. Quick Start 5 Balanced Scorecard Metrics
  23. Quick Start 6 Common BYOD Mistakes
  24. Quick Start 7 BYOD Corporate Policy
  25. Quick Start 8 Mobile Device Management Functionality Guide
  26. Quick Start 9 Legal Issues with BYOD
  27. Quick Start 10 Managing Online Content Checklist
  28. Quick Start 11 Selecting a Content Management System Checklist
  29. Quick Start 12 BYOD Lessons Learned
  30. Quick Start 13 BYOD Risks
  31. Quick Start 14 Getting Started with BYOD
  32. Quick Start 15 BYOD Security Tips
  33. Quick Start 16 Cloud Migration Tips
  34. Quick Start 17 Hitching Your Network to BYOD
  35. Appendix A: Security Glossary
  36. Appendix B: Employee Mobile Device Agreement
  37. Appendix C: Mobile Device Security Checklist
  38. Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices
  39. Appendix E: Traditional IT Metrics Reference
  40. Appendix F: Cloud Procurement Questions
  41. Appendix G: Computer Use Policy
  42. Appendix H: Benchmarking Data Collection Methods
  43. Appendix I: Wireless Device Agreement
  44. Appendix J: Mobile Device Management Vendors
  45. Appendix K: Best Practices Security Checklist
  46. Index