Shadow IT
/
overview
Shadow IT
course_overview
Shadow IT bypasses IT and security controls - find out how it's being done.
count_chapters
begin_reading
download
p_implied_book_part_name
Shadow IT
16 chapters
Begin
›
0. Disclaimer
1. Shadow IT: An Introduction
2. Local Tunnels
3. Zero Knowledge services
4. Use of Nonstandard Service Ports
5. SSL VPNs
6. Misused Online Conferencing Tools
7. Encrypted File Transfer in Browser
8. Cloud Services
9. File Sync Danger
10. Portable Apps
11. Desktop Virtualization
12. Desktop Virtualization and TOR
13. Unblocked TOR Access
14. Anti-Censorship Services
15. Summary and looking forward