Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Record 22 of 24
Results Page:  Previous Next
Author Gillis, Tom.

Title Securing the borderless network : security for the web 2.0 world / Tom Gillis. [O'Reilly electronic resource]

Imprint Indianapolis, IN : Cisco Press, ©2010.
QR Code
Description 1 online resource (xvi, 148 pages) : illustrations
Bibliography Includes bibliographical references and index.
Contents Network security : yesterday, today, and tomorrow -- Collaboration and web 2.0 technologies -- Building relationships with web 2.0 -- The cloud computing revolution -- You're in San Jose, I'm in Bangalore, let's meet -- Watson, can you hear us? -- The consumerization of IT -- The bad guys from outside : malware -- Who are these guys? -- Signs of hope -- Acceptable use policies -- The realities of data loss -- Collaboration without confidence -- Identity management : we need to know if you are a dog -- Security for the borderless network : making web 2.0 and 3.0 safe for business.
Summary Securing the Borderless Network: Security for the Web 2.0 World Tom Gillis Securing the Borderless Network reveals New techniques for securing advanced Web 2.0, virtualization, mobility, and collaborative applications Today's new Web 2.0, virtualization, mobility, telepresence, and collaborative applications offer immense potential for enhancing productivity and competitive advantage. However, they also introduce daunting new security issues, many of which are already being exploited by cybercriminals. Securing the Borderless Network is the first book entirely focused on helping senior IT decision-makers understand, manage, and mitigate the security risks of these new collaborative technologies. Cisco® security technology expert Tom Gillis brings together systematic, timely decision-making and technical guidance for companies of all sizes: information and techniques for protecting collaborative systems without compromising their business benefits. You'll walk through multiple scenarios and case studies, from Cisco Webex® conferencing to social networking to cloud computing. For each scenario, the author identifies key security risks and presents proven best-practice responses, both technical and nontechnical. Securing the Borderless Network reviews the latest Cisco technology solutions for managing identity and securing networks, content, endpoints, and applications. The book concludes by discussing the evolution toward "Web 3.0" applications and the Cisco security vision for the borderless enterprise, providing you with a complete security overview for this quickly evolving network paradigm.
Subject Web 2.0 -- Security measures.
Online social networks -- Security measures.
Web 2.0 -- Sécurité -- Mesures.
Réseaux sociaux (Internet) -- Sécurité -- Mesures.
Electrical & Computer Engineering.
Engineering & Applied Sciences.
Telecommunications.
Other Form: Print version: 9786612569005
ISBN 9781587058868 (pbk.)
1587058863 (pbk.)
9781587141287
1587141280
8131745147
9788131745144
Standard No. 9786612569005
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information