Atjaunināt sīkdatņu piekrišanu

E-grāmata: ENTERPRISE 2.0 IMPLEMENTATION: Integrate Web 2.0 Services into Your Enterprise

4.25/5 (16 ratings by Goodreads)
  • Formāts: 500 pages
  • Izdošanas datums: 01-Oct-2008
  • Izdevniecība: Osborne/McGraw-Hill
  • Valoda: eng
  • ISBN-13: 9780071591614
Citas grāmatas par šo tēmu:
  • Formāts - EPUB+DRM
  • Cena: 50,50 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 500 pages
  • Izdošanas datums: 01-Oct-2008
  • Izdevniecība: Osborne/McGraw-Hill
  • Valoda: eng
  • ISBN-13: 9780071591614
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.







Deploy Dynamic Web 2.0 Services in Corporate Networks

Facilitate collaboration and foster internal innovation by integrating next-generation Web 2.0 technologies throughout your enterprise IT framework. Packed with real-world examples and timesaving tips, Enterprise 2.0 Implementation shows how to use viral and social networking tools to gain the competitive edge. Get full details on managing corporate blogs, wikis, mashups, RSS feeds, tagging and bookmarking data, and RIAs.  You'll also learn how to maximize ROI, use Semantic Web technologies, and implement security.    





Expand corporate presence to Facebook, MySpace, LinkedIn, and Ning

Build internal social networks using open source and commercial applications

Reduce infrastructure and IT costs through SaaS vendors

Consolidate disparate information using Enterprise 2.0 Discovery

Manage wikis, blogs, mashups, and RSS/Atom feeds

Set up Rich Internet Applications

Develop security, risk management, and disaster recovery strategies
Foreword xix
Acknowledgments xxiii
Introduction xxv
Part I Overview of Enterprise 2.0
The Evolving Technology Environment
3(18)
Web 1.0
4(1)
Before Web 1.0
5(1)
Web2.0
6(7)
Web 2.0 Technologeis
8(2)
Web 2.0 Warnings
10(1)
Colaboration
11(1)
It's All About the Content
12(1)
Enterprise 2.0
13(6)
Enterprise 2.0 as a Competitive Advantage
15(2)
Making the Move to Enterprise 2.0
17(2)
Summary
19(2)
Enterprise 2.0 ROI
21(18)
The Need for Measuring Return on Investment (ROI)
22(1)
Measuring Enterprise ROI
22(2)
Measuring ROI in web 1.0
23(1)
Measuring ROI for Small Projects
23(1)
Measuring ROI for Large Projects]
23(1)
What Does ROI Measure?
24(1)
Return on Investment Anmalysis
24(12)
The Scenario
24(1)
Enterprise 2.0 Solutins
25(1)
Goas
25(1)
Costs
26(1)
Implementation
26(1)
Adoption Success
27(1)
Beginning the ROI Measurement Process
27(6)
Measuring Benefits to Joction
33(3)
Measuring the Return on Ivestment
36(1)
Comparing open Source Costs
37(1)
Open Source Sofware Costs
37(1)
Summary
38(1)
Social Media and Networking
39(16)
Pre-Internet Networking
40(1)
The Internet Expands communications
41(1)
The Need for Online Networking
41(1)
The First Online Social Networks
41(1)
Present Day:Facebook and MySpace
42(1)
Combining Business Networking and Social Networking
42(3)
Social Nwtworking Theory
43(1)
Network Effects
43(1)
Social Networking in the Office
44(1)
Social Networking Outside the Office
44(1)
Barriers to Adoption
45(2)
Risks of Implementing andUsing Social Networks
46(1)
Overviewof Current Social Networking Paltforms
47(5)
Facebook
47(1)
MySpace
48(1)
Linkedln
48(1)
Ning
48(4)
Internal Social Networking
52(2)
Awareness
52(1)
IBM Lotus Connetions
53(1)
Clearspace X
53(1)
HiveLive
53(1)
Bringing social Networking to the Enterprise
54(1)
Summary
54(1)
Software as a service
55(16)
Software as a Product
56(3)
Economics of Software as a Products
57(1)
Using Software as a Product
58(1)
The New Model: Software as a Service
59(3)
SaaS Challenges
60(2)
Infrastructure as a Service
62(3)
Virtualization
63(1)
Virtual Appliances
64(1)
SaaS Security
65(1)
ASP Versus SaaS Model
66(2)
Summary
68(3)
Part II Implementing Enterprise 2.0 Technologies
Architecting Enterprise 2.0
71(38)
Why Enterprise 2.0
72(2)
A Quick and Dirty Enterprise 2.0 Case Study
72(2)
Why Enterprise 2.0 Faces Greater Challenges than Web 2.0
74(2)
The Internet vs, the Intranet
76(5)
The Intranet
78(3)
Leveraging Existing Information Assets
81(10)
Master Data Managenment
82(2)
Thinking in Terms of SOA
84(2)
Sefvice-oriented architiecture: the Plumbing
86(2)
Search, Search, Search
88(2)
SOA adn Democracy
90(1)
Discovery
91(6)
Crawling and indexing
91(1)
Searching
92(5)
Motivation
97(1)
Authorship
98(1)
Capitalizing on Informal Networks
99(5)
Signals
104(1)
Rich Internet Applications
105(1)
Summary
106(3)
Enabling Discovery
109(36)
Why Companies Need Discovery
110(1)
The Enterprise 2.0 Discovery Vison
111(3)
Implementing Discovery in a Phased Approach
114(3)
Respecting Security
117(3)
Integrating Line-of-Business Applications
120(3)
Customizing the Search User Interface
123(1)
Leveraging Collective Intelligence: Social Bookmarking
124(3)
An Enterprise 2.0 Discovery Case Study
127(16)
Planting the Seed
130(10)
Enterprise Search Vendors
140(2)
Social Bookmarking Vendors
142(1)
Summary
143(2)
Implementing Signals and Syndication
145(34)
What Is Web syndication?
146(9)
Types of Feeds
149(1)
Advantages of Web Syndication
149(3)
Feed Readers
152(3)
XML
155(9)
XML Documents
156(8)
RSS
164(7)
RSS 0.91
165(2)
RSS 0.92
167(2)
RSS 1.0
169(2)
RSS 2.0
171(1)
Atom
171(6)
Atom 1.0 Format
171(4)
Parsing an Atom Feed
175(2)
Summary
177(2)
Implementing Wikis
179(24)
What Is a Wike?
180(3)
Evolution of Wikis
180(2)
Why Use a Wiki?
182(1)
Using a wiki
183(9)
Editing Content in a wiki
184(3)
Recent Changes
187(1)
Page Revisions
188(1)
Locking pages
189(1)
Linking and Searching Wikis
190(1)
Wiki Roles
191(1)
CMS, ECM. and Wikis
192(1)
Wiki Platforms
192(3)
Installing a Wiki
195(4)
Installing a Wiki on a Server
196(2)
Installing a Wiki Virtual Machine
198(1)
Adopting Wikis in a Corpration
199(2)
A Journey, Not a Destination
201(2)
Implemetning Blogs
203(34)
What Is a Blog?
204(1)
The Blog as a Printing Press
204(1)
Business Blogging
205(19)
How to Blog
206(9)
Characteristics of a Blog
215(2)
Other Types of Blogs
217(1)
Blog Search Engines
218(4)
Mixing Work and Personal Life
222(1)
Building a Community of Business Bloggers
223(1)
Blogging on the Intranet
224(11)
Other Blogging Paltforms
230(1)
Monitoring the Blogsphere
231(4)
Summary
235(2)
Building Mashup Capabilities
237(26)
Mashups in the Real world
241(13)
Mashup Makers
241(2)
Service and Widget Makers on the Internet
243(5)
Service and widget Makers on the Internet
248(4)
Mashup Servers
252(2)
Enterprise Mashup Maker: Spreadsheets for Enterprise Applications
254(7)
Summary
261(2)
Rich Internet Applications
263(20)
What Is a Rich Internet Application?
264(2)
The Web as a Platform
266(1)
AJAX
266(8)
XMLHttp Request
268(1)
JavaScript and the Document Object Model
269(1)
Using the XMLHttpRequest Object
270(2)
Google Widgets Toolkit
272(2)
ASP.NET AJAX
274(4)
Server-Centric Model
274(2)
Client-Centric Model
276(2)
The Future of RIAs
278(4)
Adobe Flex
278(1)
Example Flex Application
279(2)
Microsoft Silverlight
281(1)
Summary
282(1)
Implementing Social Networking
283(30)
Social Capital
285(4)
Defining Informal Networks
289(10)
Social Graphs
290(9)
Social Graphs of the Corporate Intranet
299(2)
Visible Path
299(2)
Social Networking Software
301(10)
SocialEngine
302(9)
Summary
311(2)
The Semantic Web
313(24)
HTML Markup
314(3)
The Semantic Web
317(6)
Ontologies
317(2)
Human Understanding
319(1)
Layer Cake
320(1)
Semantic Web Value Propsition
321(1)
Approach
322(1)
RDF
323(4)
SPARQL
325(2)
OWL
327(3)
Micorformats
330(3)
Semantic Web Technologies and Enterprise 2.0
331(2)
Summary
333(4)
Part III Managing Enterprise 2.0
Governance, Risk Management, and compliance
337(18)
Whole Foods Market Inc.
338(3)
A New Era of Governance
341(1)
Risk Management
342(1)
Best Practices
342(1)
Culture
343(1)
Mitigating Risk
343(1)
Regulatins and Liability
344(3)
Resource Abuse
346(1)
Managing Best Practices
347(1)
Standards
348(1)
Structure
348(1)
Discoverability
349(1)
Cultural Governance
350(1)
Transparency, flatness, and Informal Networks
350(1)
Compliance
351(2)
Securities Exchange Act of 1933: The Quiet Period
351(1)
E-Disocovery
352(1)
Business Record Retention
352(1)
Summary
353(2)
Security
355(26)
Security = Risk Management
356(6)
Managed Risk
357(1)
What Is``Good'' Security?
358(1)
Getting Hacked
359(1)
Think Like a Hacker
360(1)
Internal Threats
361(1)
Security Policies and Procedures
361(1)
Sensitive Inforamtion
361(1)
Security Technologies
362(2)
HTTPS
362(1)
Securing Web Services
363(1)
Auditing Enterprise 2.0 Applications
364(5)
Gathering an Inventory
365(1)
Auditing Content
366(3)
Reviewing Authorization
369(1)
Security Vulnerabilities
369(10)
Third-Party Software
370(1)
Google Hacking on the Intranet
371(1)
Securign Mashups
372(1)
Denial of Service Attacks
372(1)
SQL Injection
373(2)
Cross-Site Scripting
375(2)
Sample Vulnerabilities
377(1)
Security Vulnerabilities in RIA
378(1)
Summary
379(2)
Glossary 381(10)
Index 391
Aaron C. Newman (Rochester, New York) is the Founder and President of Techrigy, Inc. (www.techrigy.com). Newman is responsible for leading the organization and defining the company's overall vision. Newman is a serial entrepreneur having previously founded two successful startups, DbSecure and Application Security, Inc. Prior to AppSecInc, Newman founded DbSecure, Inc. where he played the role of both CEO and CTO. He led the acquisition of DbSecure by the publiclytraded company Internet Security Systems (ISSX) in 1998. After this acquisition, Newman managed the development of database security solutions at ISS. Newman has held several other technology positions as an IT consultant with Price Waterhouse, as a developer for Bankers Trust, and as an independent IT consultant.