Book description
Securing the Borderless Network: Security for the Web 2.0 World
Tom Gillis
Securing the Borderless Network reveals New techniques for securing advanced Web 2.0, virtualization, mobility, and collaborative applications
Today’s new Web 2.0, virtualization, mobility, telepresence, and collaborative applications offer immense potential for enhancing productivity and competitive advantage. However, they also introduce daunting new security issues, many of which are already being exploited by cybercriminals. Securing the Borderless Network is the first book entirely focused on helping senior IT decision-makers understand, manage, and mitigate the security risks of these new collaborative technologies.
Cisco® security technology expert Tom Gillis brings together systematic, timely decision-making and technical guidance for companies of all sizes: information and techniques for protecting collaborative systems without compromising their business benefits. You’ll walk through multiple scenarios and case studies, from Cisco Webex® conferencing to social networking to cloud computing. For each scenario, the author identifies key security risks and presents proven best-practice responses, both technical and nontechnical.
Securing the Borderless Network reviews the latest Cisco technology solutions for managing identity and securing networks, content, endpoints, and applications. The book concludes by discussing the evolution toward "Web 3.0" applications and the Cisco security vision for the borderless enterprise, providing you with a complete security overview for this quickly evolving network paradigm.
Table of contents
- Title Page
- Copyright Page
- Dedication
- Contents at a Glance
- Contents
- About the Author
- Acknowledgments
- Foreword
- Introduction
- Chapter 1. Network Security—Yesterday, Today, and Tomorrow
- Chapter 2. Collaboration and Web 2.0 Technologies
- Chapter 3. Building Relationships with Web 2.0
- Chapter 4. The Cloud Computing Revolution
- Chapter 5. You’re in San Jose, I’m in Bangalore—Let’s Meet
- Chapter 6. Watson, Can You Hear Us?
- Chapter 7. The Consumerization of IT
- Chapter 8. The Bad Guys from Outside: Malware
- Chapter 9. Who Are These Guys?
- Chapter 10. Signs of Hope
- Chapter 11. Acceptable Use Policies
- Chapter 12. The Realities of Data Loss
- Chapter 13. Collaboration Without Confidence
- Chapter 14. Identity Management: We Need to Know if You Are a Dog
- Chapter 15. Security for the Borderless Network: Making Web 2.0 and 3.0 Safe for Business
- Index
Product information
- Title: Securing the Borderless Network: Security for the Web 2.0 World
- Author(s):
- Release date: April 2010
- Publisher(s): Cisco Press
- ISBN: 9781587141287
You might also like
book
Privacy Defended: Protecting Yourself Online
Privacy Defended: Protecting Yourself Online is a comprehensive book that melds detailed, how-to information on PC …
book
Securing Cisco IP Telephony Networks
The real-world guide to securing Cisco-based IP telephony applications, devices, and networks Cisco IP telephony leverages …
book
Broadband Telecommunications Technologies and Management
The focus of this book is broadband telecommunications: both fixed (DSL, fiber) and wireless (1G-4G). It …
book
100 SOA Questions: Asked and Answered
brings together authoritative answers to the most crucial questions business, technical, and architectural decision-makers ask about …