Bring Your Own Devices (BYOD) Survival Guide

@inproceedings{Keyes2013BringYO,
  title={Bring Your Own Devices (BYOD) Survival Guide},
  author={Jessica Keyes},
  year={2013}
}
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been… CONTINUE READING

Figures and Topics from this paper.

Explore Further: Topics Discussed in This Paper

Citations

Publications citing this paper.
SHOWING 1-10 OF 12 CITATIONS

References

Publications referenced by this paper.
SHOWING 1-10 OF 42 REFERENCES

Knowledge Management, Business Intelligence, and Content Management: The IT Practitioner's Guide

  • Knowledge Management, Business Intelligence, and…
  • 2006

Auerbach,.2003 Balanced Scorecard

  • Software Engineering Handbook, Auerbach
  • Auerbach,. Balanced Scorecard
  • 2002

The Handbook of eBusiness

  • The Handbook of eBusiness
  • 2000

The Handbook of Internet Management

  • The Handbook of Internet Management
  • 1999

.103 Initiation...............................................................................104 Development........................................................................107 Implementation

  • Life Cycle
  • .103 Initiation…

.109 Disposal. ................................................................................110 Case.Study

  • Operations, Maintenance
  • .109 Disposal…

.78 A.Typical.Organization's

  • Risk, Assessment
  • Computer.System. ..........................79…

114 CSP.and.End-User

  • Chapter, Cloud, Best, Practices, A Selecting, Service
  • .117 Measuring.SLA.Performance…

Similar Papers

Loading similar papers…