byod
Post on 03-Jan-2016
213 Views
Preview:
TRANSCRIPT
• BYOD
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Mobile security - Notes
1 ^ a b BYOD and Increased Malware Threats Help Driving Billion Dollar Mobile Security Services Market in
2013, ABI Research
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Novell - Products
1 ZENworks Mobile Management Secure and manage the mobile
devices your users want to work on, both corporate-issued and personal
(BYOD)
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Mobile app - Enterprise management
1 Mobile Application management (MAM) describes software and
services responsible for provisioning and controlling access to internally
developed and commercially available Mobile Apps used in
business settings, which has become necessary with the onset of Bring
your own device (BYOD) phenomenon
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Mac Mini
1 The Mac Mini was the first consumer level Macintosh desktop to ship without a display, keyboard, or mouse since Apple's success
following the release of the iMac, with Apple marketing it as BYODKM (Bring Your Own Display, Keyboard,
and Mouse)
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Bring your own device
1 'Bring your own device' ('BYOD') (also called 'bring your own technology'
('BYOT'), 'bring your own phone' ('BYOP'), and 'bring your own PC' ('BYOPC')) refers to the policy of permitting employees to bring personally owned mobile devices (laptops, tablets, and smart phones) to
their workplace, and to use those devices to access privileged company information and applications
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Bring your own device
1 http://www.retailwire.com/discussion/16188/happiness-is-
bringing-your-own-computer-devices-to-work Many feel that BYOD can even be a means to attract new hires, pointing to a survey that
indicates 44% of job seekers view an organization more positively if it
supports their device
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Bring your own device - History
1 The term BYOD was mentioned in a paper by
Ballagas et al., at UBICOMP 2005.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Bring your own device - History
1 BYOD first entered in 2009, courtesy of Intel when it recognized an increasing tendency
among its employees to bring their own devices to work and connect them to the corporate network. However, it took until early 2011 before the term achieved any
real prominence when IT services provider Unisys and software vendors VMware and
Citrix Systems started to share their perceptions of this emergent trend.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Bring your own device - History
1 In 2012, the U.S.A Equal Employment Opportunity Commission adopted a BYOD policy, but many employees continued to use their government-
issued BlackBerrys because of concerns about billing, and the lack
of alternative devices.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Bring your own device - Issues
1 BYOD security relates strongly to the end node problem, wherein a device is used to
access both sensitive and risky networks/services. Because of Internet-based
risks, some very risk-averse organizations issue devices specifically for Internet use (this
is termed Inverse-BYOD).The U.S. Air Force Research Lab's (AFRL) Leader iPad Pilot did uses this method to provide its researchers
unfiltered access to the Internet, reserving its filtered, sensitive network for other use.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Bring your own device - Issues
1 BYOD has resulted in data breaches. For example, if an employee uses a smartphone
to access the company network and then loses that phone, untrusted parties could
retrieve any unsecured data on the phone. - eSecurityPlanet.com Another type of security breach occurs when an employee leaves the company, they do not have to give back the device, so company applications and other data may still be present on their device.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Bring your own device - Issues
1 A key issue of BYOD which is often overlooked is BYOD's phone number
problem, which raises the question of the ownership of the phone number. The issue
becomes apparent when employees in sales or other customer-facing roles leave the
company and take their phone number with them. Customers calling the number will
then potentially be calling competitors which can lead to loss of business for BYOD
enterprises.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Bring your own device - Issues
1 A challenging but important task for companies who utilize BYOD is to
develop a policy that defines exactly what sensitive company information
needs to be protected and which employees should have access to
this information, and then to educate all employees on this policy.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Bring your own device - Issues
1 The USMC is seeking to outsource the security requirements of their
BYOD policy to commercial carriers such as Sprint Corporation|Sprint,
Verizon, and ATT.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Bring your own device - Advantages
1 Many industries are adopting BYOD quicker than others. A recent study by Cisco partners of BYOD practices stated that the education industry
has the highest percentage of people using BYOD for work at 95.25.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Bring your own device - Advantages
1 Employee satisfaction, or job satisfaction, occurs with BYOD by
allowing the user to use the device they have selected as their own
rather than one selected by the IT team
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Bring your own device - Advantages
1 A company can also see improved productivity from an employee with BYOD as it allows for the ability to easily take the device home and
work.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Mobile application management - History
1 The “bring your own device” (BYOD) phenomenon is a factor behind
Mobile Application management, with personal PC, smartphone and tablet use in business settings (vs
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Mobile security
1 According to ABI Research the Mobile Security Services market will total around $1.88 billion by the end of
2013.[http://www.abiresearch.com/press/byod-and-increased-malware-threats-help-driving-bi BYOD and Increased Malware Threats Help
Driving Billion Dollar Mobile Security Services Market in 2013], ABI
Researchhttps://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Lenovo Thinkpad - ThinkPad Helix
1 The first batch of Windows 8 ultrabooks get high marks for their inspired designs, but aren’t quite flexible enough to truly be BYOD
(Bring Your Own Device) solutions
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Ceedo
1 The Ceedo Client Family mostly addresses issues relating to management, security and
interoperability in portable computing scenarios, disaster recovery and business
continuity,Disaster Recovery datasheet: http://files.ceedo.com/resources/SO_DisasterRec
overy.pdf roaming users and work from home scenarios,Work from Home datasheet:
http://files.ceedo.com/resources/SO_WorkFromHome.pdf BYOD and general management of corporate computing assets on unmanaged
desktops.https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
MetroPCS - Merger with T-Mobile USA
1 T-Mobile US plans to have the CDMA network decommissioned by the
second half of 2015 and all current customers are expected to have
been moved onto the expanded T-Mobile
networks.[http://www.phonenews.com/metropcs-to-launch-t-mobile-
powered-devices-and-byod-later-this-month-23007/ MetroPCS To Launch T-
Mobile Powered Devices And BYOD Later This Month]
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Mobile device management
1 This applies to both company-owned and employee-owned (Bring Your Own Device|BYOD) devices across the enterprise or mobile devices
owned by consumers.[ http://searchmobilecomputing.techtarget.com/sDefinition/0,290660,sid40_gci1196634,00.html What is mobile
device management? - a definition from Whatis.com][
http://www.devicemanagement.org/content/view/20754/152/ A
comprehensive article on mobile device management ]
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Mobile device management
1 Companies are alarmed at the rate of employee adoption of mobile devices
to access corporate data. MDM is now touted as a solution for
managing corporate-owned as well as personal devices in the workplace. The primary challenge is the ability to manage the risks associated with mobile access to data while securing
company issued and BYOD (Bring Your Own Device) mobile devices.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Network Admission Control - Agent-less posture assessment
1 Most NAC vendors require the 802.1x supplicant (client or agent) to be
installed. Some, including Netclarity, Trustwave, and Enterasys [
http://www.scmagazine.com/enterasys-nac-v33/review/3273/ Enterasys
Review][https://www.trustwave.com/network-access-control/nac-
process.php Trustwave Datasheet] offer an agent-less posture checking. This is designed to handle the Bring Your Own Device or BYOD scenario
to:
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
SAP Afaria - Usage
1 Due to the increasing popularity of smartphones and other mobile
devices in the general population, many people now bring their own
devices (Mobile_application_management#The_Mobility_Invasion_and_.E2.80.98B
YOD.E2.80.99|BYOD) to work
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Enterproid
1 'Enterproid' is an enterprise mobility management software company that
helps business customers manage employee-owned smartphones and tablets, a trend known as Bring your own device|Bring Your Own Device
(BYOD). Enterproid is best known for its dual-persona platform called Divide, which separates iOS and
Android devices into two personas for work and play.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Enterproid - Product
1 Enterproid was one of the first companies to introduce a dual-persona approach for enterprise mobility management and BYOD
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Enterproid - History
1 [http://www.ibtimes.com/meet-enterproid-nyc-startup-tackled-byod-
mobile-app-divides-849837 Meet Enterproid: An NYC Startup That
Tackled BYOD With A Mobile App That Divides]
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Ericom Software - Overview
1 Running entirely within a browser, AccessNow works natively with Google Chrome,
Chromebooks, Chromebox, Safari, Internet Explorer, Firefox and any other browser with
HTML5 and WebSocket support. HTML5 browsers can run on desktops, laptops, tablets,
iPad (enabling Flash to run on an iPad), and SmartPhones. This enables organizations
(companies, schools, universities, hospitals, government agencies) to allow BYOD (Bring
Your Own Device) initiatives.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Novell Press - Products
1 *'ZENworks Mobile Management' Secure and manage the mobile
devices your users want to work on, both corporate-issued and personal
(BYOD)
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
IT as a service - Transformation to IT as a Service
1 *New consumption models leveraging self-service catalogs
offering both internal and external services; providing IT financial
transparency for costs and pricing; offering IT consumerization|
consumerized IT – such as bring your own device (BYoD) – to meet the
needs of users. All of which simplify and encourage consumption of
services.https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Infoblox - Technology
1 The company has since added DNS security products to its line, [
http://www.marketwatch.com/story/infoblox-expands-security-offerings-to-help-protect-against-dns-
security-threats-and-byod-risks-2013-06-10 Infoblox Expands Security Offerings to Help Protect Against
DNS Security Threats and BYOD Risks,” MarketWatch, June 10, 2013], retrieved 11/27/13.URL[
http://www.marketwatch.com/story/infoblox-introduces-a-new-defense-against-advanced-
persistent-threats-2013-10-30 ”Infobox Introduces a New Defense Against Advanced Persistent Threats,” MarketWatch, October 30, 2013], retrieved 11/27/13
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Untangle - History
1 In January, 2013, Untangle released Untangle 9.4, including an all-new Captive Portal to
work with its Integrated Rules Engine (IRE), allowing for varied use cases like mobile device management for bring your own
device (BYOD) environments, integration with payment providers to support paid access for wi-fi hotspots, and separate policies for wi-fi and wired users. Other changes included an improved Session
Viewer and new Host Table view.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
BYOD - Issues
1 BYOD has resulted in data breaches.[http://www.computerweekly.com/news/2240161
202/Nearly-half-of-firms-supporting-BYOD-report-data-breaches] For example, if an employee uses a smartphone to access the company network and then loses that phone, untrusted parties could retrieve any unsecured data on the phone.[http://www.esecurityplanet.com/mobile-security/4-
steps-to-securing-mobile-devices-and-apps-in-the-workplace-mdm-byod.html 4 Steps to Securing Mobile
Devices and Apps in the Workplace] - eSecurityPlanet.com Another type of security breach occurs when an employee
leaves the company, they do not have to give back the device, so company applications and other data may still
be present on their device.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
IEEE Technology Management Council - Conferences
1 * BYOD – extended infrastructure
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Government contract - Contractor Damage
1 FAR Part 45 provides rules on the Contractor’s obligations and the Government’s remedies in these
cases. Specific clauses should be in the contract to deal with
Government-Furnished Property|Government Furnished Equipment
(GFE) situations and bring your own device (BYOD) situations.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
List of buzzwords - Science and technology
1 * BYOD|Bring your own Device - use of personal equipment (usually mobile) in a
work environment
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Ferdinand Marcos - Post-presidency
1 Marcos was interred in a private mausoleum at Byodo-In Temple on the island of Oahu, visited daily by
the Marcos family, political allies and friends
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Closed platform - Examples
1 * Verizon Wireless' CDMA network and policies effectively prohibiting
BYOD|activation of non-Verizon sanctioned devices on their network. Verizon Wireless is frequently noted
(and often criticized) for this practice.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Imperial cult (ancient Rome) - Saviours and monotheists
1 Limited preview available at Google Books [http://books.google.co.uk/books?id=cOjCkfLCt3sCpg=PA79lpg=PA79dq=Philo+Gaius+Jewssource=blots=98cMQBPhKhsig=tNu1YqVtNWKbyODrrfmBYAjvtJAhl=enei=8pmESsXHGYSNjAevipmHCAsa=Xoi=book_resultct=resultresnum=1#v=onepageq=Philo%20Gaius%20Jewsf=false Books.Google.co.uk] (accessed 14 August
2009
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Trial of Archbishop Laud - Additional charges
1 |last=ApplebyODNBweb|id=28949|
title=Weckherlin, Georg Rudolph|first=S
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
IonGrid - Product
1 Stratos is available as a free personal edition and enterprise edition.[http://www.forbes.com/sites/petercohan/2011/12/09/iong
rid-lets-ipads-go-hollywood/ Peter Cohan, Forbes, December 9, 2011: ionGrid Lets iPads Go
Hollywood][http://www.ctoedge.com/content/bringing-apple-ipad-enterprise Mike Vizard, CTOEdge, November 22, 2011: Bringing
the Apple iPad into the Enterprise][http://www.ubergizmo.com/2011/11/iongrid-nexus-enterprise/ Hubert Nguyen, Ubergizmo, November 15, 2011:
Iongrid Nexus Enterprise Cracks BYOD][http://www.dailydisruption.com/2011/12/disruptor-of-the-day-iongrid-bringing-the-ipad-to-the-enterprise-by-managing-
documents-not-the-device/ Bill Klump, Daily Disruption, December 14, 2011: Disruptor of the Day: ionGrid – Bringing The iPad To The Enterprise By Managing Documents Not The Device]
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
2X Software - Profile
1 2X Mobile Device Management (2X MDM) is a solution for enterprise mobility management and mobile device management. It provides a set of tools to create a Bring Your
Own Device (BYOD) Policy and reduce the risk of Data loss
prevention software|data leakage.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
2X Software - 2X Mobile Device Management
1 2X MDM is a mobile device management platform that enables businesses to address challenges
associated with mobility such as data security, BYOD-related issues, application control and policy
distribution.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
2X Software - 2X Mobile Device Management
1 2X MDM reinforces a BYOD policy by supporting iPhones and iPads, Android and even Windows devices. BYOD is known to add administrative complications for IT management. When an
employee-owned, consumer-oriented device is used for work-related purposes, issues such as privacy, control, policy distribution, security, and data protection need to be addressed to ensure that business data are protected while not compromising the device owner's personal
data.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Artificial insemination - General
1 His improvement of breeding efficiency by the use of antibiotics (first proven with penicillin in 1946) to control
bacterial growth, decreasing embrionic mortality and increase fertility, and various new techniques for processing, freezing and thawing of frozen semen
significantly enhanced the practical utilization of AI in the livestock industry, and earned him the
[http://books.google.com/books?id=1v2vJmdAj84Cpg=PA121lpg=PA121dq=john+o+almquistsource=blots=wd0N09r8k8sig=0WdA2pVGIqW7BMCXQDzQZjl76xUhl=enei=00XtTPLsBYOdlgfL0_CLAQsa=Xoi=book_resultct=resultresnum=7ved=0CC0Q6AEwBg# 1981 Wolf Foundation Prize in Agriculture] 1981 Wolf
Foundation Prize in Agriculture
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Digital Textbook - Devices
1 A BYOD approach may also count out students who cannot afford a computer, e-
reader or smartphone.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Software Defined Perimeter - Background
1 But the traditional fixed perimeter model is rapidly becoming obsolete
because of BYOD and phishing attacks providing untrusted access inside the perimeter and SaaS and
IaaS extending the perimeter into the Internet.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Echoworx - Products
1 *mobilEncrypt - On-device email encryption for iOS, Android (operating system)|Android and Blackberry (company)|BlackBerry products.
[http://www.scmagazine.com/echoworx-mobilencrypt-endpoint/review/3679/ SC
Magazine mobilEncrypt Review] mobilEncrypt was response to a growing trend of BYOD
policies in businesses[http://www.itworldcanada.com/article/echoworx-extends-e-mail-device-encryption-to-ipad-iphone/44422 Echoworx extends e-mail
device encryption to iPad, iPhone]https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Workspace - Mobile or Unified Workspace
1 Ever since the iPad was released by Apple in 2009, BYOD has become an increasingly more important problem for IT.http://www.zdnet.com/making-
byod-work-7000029483/ Until now, IT has purchased, provisioned, and managed all enterprise desktops which run the Microsoft Windows
software.http://www.workspot.com/wp-content/uploads/2014/02/Workspot-
Technology-White-Paper-.pdf There are nearly 500 million enterprise
desktops in the world
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Workspace - Mobile or Unified Workspace
1 Federica Tronihttp://www.gartner.com/AnalystBiography?authorId=10906 and Mark Margeviciushttp://www.gartner.com/A
nalystBiography?authorId=13910 introduced the concept of Workspace Aggregatorhttps://www.gartner.com/d
oc/2112416/overview-workspace-aggregators to solve the problem of
BYOD. According to Gartner, a workspace aggregator unifies five
capabilities:
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Microsoft-Novell agreement - Products
1 ** 'ZENworks Mobile Management' secures and manages mobile
devices, both corporate-issued and personal (Bring your own device|
BYOD)
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
KACE Networks - Mobile device management
1 As personal mobile devices as smart-phones and tablets are getting used in enterprise environments, including allowing them some level of access to the enterprise IT infrastructure
under the term bring your own device (BYOD), KACE anticipated a
demand to manage mobile devices in a similar way as laptops, workstations or servers.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Genpei War - Battles
1 * 1180 Battle of Uji (1180)|First Battle of Uji - regarded as the first battle in the Genpei Wars, the monks of the
Byodoin fight alongside Minamoto no Yorimasa.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
Ahuimanu, Hawaii
1 A small commercial mall is located here across the highway from the
Valley of the Temples Memorial Park, a large cemetery noted for its Byodo-
In Temple.
https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
For More Information, Visit:
• https://store.theartofservice.com/itil-2011-foundation-complete-certification-kit-fourth-edition-study-guide-ebook-and-online-course.html
The Art of Servicehttps://store.theartofservice.com
top related