Book description
Where end-users once queued up to ask the IT department for permission to buy a new computer or a new version of software, they are now bypassing IT altogether and buying it on their own. From laptops and smartphones to iPads and virtually unlimited software apps, end-users have tasted their freedom and love it. IT will simply never be the same.
Bring Your Own Devices (BYOD) Survival Guide explains the psycho-techno phenomenon also known as bring your own technology (BYOT). Providing the guidance necessary for living in this new world, it describes the new end-users (Millennials) and their demands, as well as the strategic and tactical ramifications of these demands.
Examining the business aspects of BYOD—selection, purchasing, and corporate culture—the book covers the broad range of technical considerations including selection, connectivity, training, support, and security. It also includes an extensive set of best practices.
The book is geared for the small- to medium-size enterprise that needs to integrate BYOD into their environment. It addresses topics such as content and data management, risk assessment, performance measurement, management, and even configuration management.
The text includes a set of Quick Start guides that provide tips for such things as assessing costs, cloud integration, and even legal issues. There is also a full set of appendices that supply helpful information on everything from security settings for Apple iOS devices to a sample employee mobile device agreement.
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents (1/2)
- Contents (2/2)
- Preface
- About the Author
- Chapter 1 - The BYOD Revolution (1/3)
- Chapter 1 - The BYOD Revolution (2/3)
- Chapter 1 - The BYOD Revolution (3/3)
- Chapter 2 - Making a Financial Case for BYOD (1/7)
- Chapter 2 - Making a Financial Case for BYOD (2/7)
- Chapter 2 - Making a Financial Case for BYOD (3/7)
- Chapter 2 - Making a Financial Case for BYOD (4/7)
- Chapter 2 - Making a Financial Case for BYOD (5/7)
- Chapter 2 - Making a Financial Case for BYOD (6/7)
- Chapter 2 - Making a Financial Case for BYOD (7/7)
- Chapter 3 - Integrating BYOD into Performance Measurement and Management Systems (1/6)
- Chapter 3 - Integrating BYOD into Performance Measurement and Management Systems (2/6)
- Chapter 3 - Integrating BYOD into Performance Measurement and Management Systems (3/6)
- Chapter 3 - Integrating BYOD into Performance Measurement and Management Systems (4/6)
- Chapter 3 - Integrating BYOD into Performance Measurement and Management Systems (5/6)
- Chapter 3 - Integrating BYOD into Performance Measurement and Management Systems (6/6)
- Chapter 4 - Assessment and Mitigation of Risks in a BYOD Environment (1/4)
- Chapter 4 - Assessment and Mitigation of Risks in a BYOD Environment (2/4)
- Chapter 4 - Assessment and Mitigation of Risks in a BYOD Environment (3/4)
- Chapter 4 - Assessment and Mitigation of Risks in a BYOD Environment (4/4)
- Chapter 5 - Guidelines for Managing and Securing Mobile Devices in the Enterprise (1/4)
- Chapter 5 - Guidelines for Managing and Securing Mobile Devices in the Enterprise (2/4)
- Chapter 5 - Guidelines for Managing and Securing Mobile Devices in the Enterprise (3/4)
- Chapter 5 - Guidelines for Managing and Securing Mobile Devices in the Enterprise (4/4)
- Chapter 6 - Cloud Best Practices (1/3)
- Chapter 6 - Cloud Best Practices (2/3)
- Chapter 6 - Cloud Best Practices (3/3)
- Chapter 7 - Configuration Management in a BYOD Environment (1/5)
- Chapter 7 - Configuration Management in a BYOD Environment (2/5)
- Chapter 7 - Configuration Management in a BYOD Environment (3/5)
- Chapter 7 - Configuration Management in a BYOD Environment (4/5)
- Chapter 7 - Configuration Management in a BYOD Environment (5/5)
- Chapter 8 - Content Management, Mobile and Otherwise (1/4)
- Chapter 8 - Content Management, Mobile and Otherwise (2/4)
- Chapter 8 - Content Management, Mobile and Otherwise (3/4)
- Chapter 8 - Content Management, Mobile and Otherwise (4/4)
- Chapter 9 - Integrating BYOD into Resource Management (1/6)
- Chapter 9 - Integrating BYOD into Resource Management (2/6)
- Chapter 9 - Integrating BYOD into Resource Management (3/6)
- Chapter 9 - Integrating BYOD into Resource Management (4/6)
- Chapter 9 - Integrating BYOD into Resource Management (5/6)
- Chapter 9 - Integrating BYOD into Resource Management (6/6)
- Chapter 10 - BYOD Means Social Networking (1/4)
- Chapter 10 - BYOD Means Social Networking (2/4)
- Chapter 10 - BYOD Means Social Networking (3/4)
- Chapter 10 - BYOD Means Social Networking (4/4)
- Quick Start 1: Software-Based Authentication
- Quick Start 2: BYOD: Making It Work for Your Firm
- Quick Start 3: Software Selection from Multiple Packages
- Quick Start 4: The Make-Buy Decision
- Quick Start 5: Balanced Scorecard Metrics (1/2)
- Quick Start 5: Balanced Scorecard Metrics (2/2)
- Quick Start 6: Common BYOD Mistakes
- Quick Start 7: BYOD Corporate Policy
- Quick Start 8: Mobile Device Management Functionality Guide
- Quick Start 9: Legal Issues with BYOD
- Quick Start 10: Managing Online Content Checklist
- Quick Start 11: Selecting a Content Management System Checklist
- Quick Start 12: BYOD Lessons Learned
- Quick Start 13: BYOD Risks
- Quick Start 14: Getting Started with BYOD
- Quick Start 15: BYOD Security Tips
- Quick Start 16: Cloud Migration Tips
- Quick Start 17: Hitching Your Network to BYOD
- Appendix A: Security Glossary (1/2)
- Appendix A: Security Glossary (2/2)
- Appendix B: Employee Mobile Device Agreement
- Appendix C: Mobile Device Security Checklist
- Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices (1/9)
- Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices (2/9)
- Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices (3/9)
- Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices (4/9)
- Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices (5/9)
- Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices (6/9)
- Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices (7/9)
- Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices (8/9)
- Appendix D: Security Configuration Recommendations for Apple iOS 5 Devices (9/9)
- Appendix E: Traditional IT Metrics Reference (1/4)
- Appendix E: Traditional IT Metrics Reference (2/4)
- Appendix E: Traditional IT Metrics Reference (3/4)
- Appendix E: Traditional IT Metrics Reference (4/4)
- Appendix F: Cloud Procurement Questions (1/2)
- Appendix F: Cloud Procurement Questions (2/2)
- Appendix G: Computer Use Policy
- Appendix H: Benchmarking Data Collection Methods (1/2)
- Appendix H: Benchmarking Data Collection Methods (2/2)
- Appendix I: Wireless Device Agreement
- Appendix J: Mobile Device Management Vendors
- Appendix K: Best Practices Security Checklist (1/12)
- Appendix K: Best Practices Security Checklist (2/12)
- Appendix K: Best Practices Security Checklist (3/12)
- Appendix K: Best Practices Security Checklist (4/12)
- Appendix K: Best Practices Security Checklist (5/12)
- Appendix K: Best Practices Security Checklist (6/12)
- Appendix K: Best Practices Security Checklist (7/12)
- Appendix K: Best Practices Security Checklist (8/12)
- Appendix K: Best Practices Security Checklist (9/12)
- Appendix K: Best Practices Security Checklist (10/12)
- Appendix K: Best Practices Security Checklist (11/12)
- Appendix K: Best Practices Security Checklist (12/12)
- Back Cover
Product information
- Title: Bring Your Own Devices (BYOD) Survival Guide
- Author(s):
- Release date: April 2016
- Publisher(s): Auerbach Publications
- ISBN: 9781466565043
You might also like
video
GenAI Essentials for Everyone - Overview
Our team of experts has hand-selected and organized the most crucial concepts and practical applications of …
book
Enterprise Mobility Suite Managing BYOD and Company-Owned Devices
Manage all the mobile devices your workforce relies on Learn how to use Microsoft’s breakthrough Enterprise …
article
Have ChatGPT Ask You Questions
ChatGPT Shortcuts shows future prompt engineers how to harness the full potential of the state-of-the-art AI …
book
Windows Server® 2008 R2 Hyper-V™: Insiders Guide to Microsoft's Hypervisor
Get the inside scoop on Hyper-V for Windows Server 2008 R2 Virtualization is a top priority …