Table of contents : Front Cover Collaboration with Cloud Computing Copyright Page Contents Preface Intended audience Organization of this book Acknowledgements 1 The Evolving Nature of Information Security Introduction History of the Internet Significant security events Evolution of services Today’s risks (in a Nutshell) Collaboration Conclusion Summary 2 Cloud Computing Introduction The protocols that made it possible HTTP and HTML XML RESTful services The cloud Infrastructure as a service Platform as a service Software as a service Storage Unified communication as a service Public, private, or hybrid Conclusion Summary 3 Software as a Service Introduction Contact lists Documents on the go Real-time editing Geo-diverse teams Agendas Document sharing Advantages Security considerations Conclusion Summary 4 Storage in the Cloud Introduction Uses of cloud storage Collaboration Large file transfer Backups Synchronization Security Privacy concerns Safe Harbor Data retention Data destruction Infrastructure Protecting yourself Encryption Data loss prevention Conclusion Summary Further reading 5 Virtual Servers and Platform as a Service Introduction History of virtualization How virtualization works Hypervisors Snapshots Platform as a service Advantages of PaaS Building a business Security considerations Conclusion Summary 6 Social Media Introduction History and impact of social networking Social networking sites Friendster MySpace Facebook Twitter Google+ Crowdsourcing Gamification Human resources Security considerations Conclusion Summary Further reading 7 Mobile Computing Introduction Smartphones Apps Jailbreaking Providing mobile access Physical security Bring your own device Boundaries Conclusion Summary Further reading 8 Unified Communications Introduction Signaling H.323 Session initiation protocol Network address translation Unified communications VoIP in the cloud Security considerations Conclusion Summary 9 Remote Workers Introduction Remote workers Pros and cons of telecommuting Management concerns and productivity Antisocial behaviors Cost savings Communication challenges Human resources and remote hires Asynchronous versus synchronous Security considerations Conclusion Summary Further reading 10 Risk Management and Policy Considerations Introduction Risk management Quantitative analysis Return on investment Social return on investment Cost–benefit analysis Qualitative assessment Security policies Legal and regulatory requirements Controls Conclusion Summary Further reading 11 Future Technology Introduction Pushing into the cloud Ubiquitous broadband Wearable computing Interfaces HTML5 Consumers as producers Conclusion Summary Further reading 12 Pulling it All Together Introduction Background Requirements Messaging Telephony Storage Human resources Project management Source control Customer relations Conclusion Summary Index