Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200709Ma 4500 
001    656358955 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr |n||||||||| 
008    100318s2010    inua    ob    001 0 eng d 
010      2010007239 
019    651127091|a667100784|a686709275|a1048089932|a1048389867
       |a1062858815|a1103265721|a1153049971 
020    9781587058868|q(pbk.) 
020    1587058863|q(pbk.) 
020    9781587141287 
020    1587141280 
020    8131745147 
020    9788131745144 
024 8  9786612569005 
029 1  AU@|b000048867240 
029 1  DEBSZ|b35544092X 
029 1  GBVCP|b785416706 
029 1  HEBIS|b29151135X 
029 1  NZ1|b13660601 
029 1  NZ1|b13925785 
029 1  AU@|b000067092227 
029 1  AU@|b000073553136 
035    (OCoLC)656358955|z(OCoLC)651127091|z(OCoLC)667100784
       |z(OCoLC)686709275|z(OCoLC)1048089932|z(OCoLC)1048389867
       |z(OCoLC)1062858815|z(OCoLC)1103265721|z(OCoLC)1153049971 
037    256900|bMIL 
040    CDX|beng|epn|cCDX|dOCLCQ|dIDEBK|dCOO|dUMI|dCEF|dOCLCQ
       |dDEBSZ|dOCLCQ|dYDX|dOCLCQ|dWYU|dUAB|dVT2|dCNCEN|dINARC
       |dUKAHL|dLDP|dOCLCO|dOCLCQ 
049    INap 
082 04 005.8 
082 04 005.8|222 
099    eBook O’Reilly for Public Libraries 
100 1  Gillis, Tom. 
245 10 Securing the borderless network :|bsecurity for the web 
       2.0 world /|cTom Gillis.|h[O'Reilly electronic resource] 
260    Indianapolis, IN :|bCisco Press,|c©2010. 
300    1 online resource (xvi, 148 pages) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
504    Includes bibliographical references and index. 
505 0  Network security : yesterday, today, and tomorrow -- 
       Collaboration and web 2.0 technologies -- Building 
       relationships with web 2.0 -- The cloud computing 
       revolution -- You're in San Jose, I'm in Bangalore, let's 
       meet -- Watson, can you hear us? -- The consumerization of
       IT -- The bad guys from outside : malware -- Who are these
       guys? -- Signs of hope -- Acceptable use policies -- The 
       realities of data loss -- Collaboration without confidence
       -- Identity management : we need to know if you are a dog 
       -- Security for the borderless network : making web 2.0 
       and 3.0 safe for business. 
520    Securing the Borderless Network: Security for the Web 2.0 
       World Tom Gillis Securing the Borderless Network reveals 
       New techniques for securing advanced Web 2.0, 
       virtualization, mobility, and collaborative applications 
       Today's new Web 2.0, virtualization, mobility, 
       telepresence, and collaborative applications offer immense
       potential for enhancing productivity and competitive 
       advantage. However, they also introduce daunting new 
       security issues, many of which are already being exploited
       by cybercriminals. Securing the Borderless Network is the 
       first book entirely focused on helping senior IT decision-
       makers understand, manage, and mitigate the security risks
       of these new collaborative technologies. Cisco® security 
       technology expert Tom Gillis brings together systematic, 
       timely decision-making and technical guidance for 
       companies of all sizes: information and techniques for 
       protecting collaborative systems without compromising 
       their business benefits. You'll walk through multiple 
       scenarios and case studies, from Cisco Webex® conferencing
       to social networking to cloud computing. For each scenario,
       the author identifies key security risks and presents 
       proven best-practice responses, both technical and 
       nontechnical. Securing the Borderless Network reviews the 
       latest Cisco technology solutions for managing identity 
       and securing networks, content, endpoints, and 
       applications. The book concludes by discussing the 
       evolution toward "Web 3.0" applications and the Cisco 
       security vision for the borderless enterprise, providing 
       you with a complete security overview for this quickly 
       evolving network paradigm. 
588    Print version record. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Web 2.0|xSecurity measures. 
650  0 Online social networks|xSecurity measures. 
650  6 Web 2.0|xSécurité|xMesures. 
650  6 Réseaux sociaux (Internet)|xSécurité|xMesures. 
650  7 Electrical & Computer Engineering.|2hilcc 
650  7 Engineering & Applied Sciences.|2hilcc 
650  7 Telecommunications.|2hilcc 
776 08 |iPrint version:|z9786612569005 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9781587141287/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    Askews and Holts Library Services|bASKH|nAH37820924 
938    Internet Archive|bINAR|nsecuringborderle0000gill 
938    Coutts Information Services|bCOUT|n13315866 
938    ProQuest MyiLibrary Digital eBook Collection|bIDEB|n256900
938    YBP Library Services|bYANK|n14851834 
938    YBP Library Services|bYANK|n15629619 
994    92|bJFN