Cargando…

Securing the borderless network : security for the web 2.0 world /

Securing the Borderless Network: Security for the Web 2.0 World Tom Gillis Securing the Borderless Network reveals New techniques for securing advanced Web 2.0, virtualization, mobility, and collaborative applications Today's new Web 2.0, virtualization, mobility, telepresence, and collaborativ...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Gillis, Tom
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, IN : Cisco Press, ©2010.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_ocn656358955
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 100318s2010 inua ob 001 0 eng d
010 |a  2010007239 
040 |a CDX  |b eng  |e pn  |c CDX  |d OCLCQ  |d IDEBK  |d COO  |d UMI  |d CEF  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d YDX  |d OCLCQ  |d WYU  |d UAB  |d VT2  |d CNCEN  |d INARC  |d UKAHL  |d LDP  |d OCLCO  |d OCLCQ 
019 |a 651127091  |a 667100784  |a 686709275  |a 1048089932  |a 1048389867  |a 1062858815  |a 1103265721  |a 1153049971 
020 |a 9781587058868  |q (pbk.) 
020 |a 1587058863  |q (pbk.) 
020 |a 9781587141287 
020 |a 1587141280 
020 |a 8131745147 
020 |a 9788131745144 
024 8 |a 9786612569005 
029 1 |a AU@  |b 000048867240 
029 1 |a DEBSZ  |b 35544092X 
029 1 |a GBVCP  |b 785416706 
029 1 |a HEBIS  |b 29151135X 
029 1 |a NZ1  |b 13660601 
029 1 |a NZ1  |b 13925785 
029 1 |a AU@  |b 000067092227 
029 1 |a AU@  |b 000073553136 
035 |a (OCoLC)656358955  |z (OCoLC)651127091  |z (OCoLC)667100784  |z (OCoLC)686709275  |z (OCoLC)1048089932  |z (OCoLC)1048389867  |z (OCoLC)1062858815  |z (OCoLC)1103265721  |z (OCoLC)1153049971 
037 |a 256900  |b MIL 
050 4 |a TK5105.88817  |b .G55 2010eb 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Gillis, Tom. 
245 1 0 |a Securing the borderless network :  |b security for the web 2.0 world /  |c Tom Gillis. 
260 |a Indianapolis, IN :  |b Cisco Press,  |c ©2010. 
300 |a 1 online resource (xvi, 148 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Network security : yesterday, today, and tomorrow -- Collaboration and web 2.0 technologies -- Building relationships with web 2.0 -- The cloud computing revolution -- You're in San Jose, I'm in Bangalore, let's meet -- Watson, can you hear us? -- The consumerization of IT -- The bad guys from outside : malware -- Who are these guys? -- Signs of hope -- Acceptable use policies -- The realities of data loss -- Collaboration without confidence -- Identity management : we need to know if you are a dog -- Security for the borderless network : making web 2.0 and 3.0 safe for business. 
588 |a Print version record. 
520 |a Securing the Borderless Network: Security for the Web 2.0 World Tom Gillis Securing the Borderless Network reveals New techniques for securing advanced Web 2.0, virtualization, mobility, and collaborative applications Today's new Web 2.0, virtualization, mobility, telepresence, and collaborative applications offer immense potential for enhancing productivity and competitive advantage. However, they also introduce daunting new security issues, many of which are already being exploited by cybercriminals. Securing the Borderless Network is the first book entirely focused on helping senior IT decision-makers understand, manage, and mitigate the security risks of these new collaborative technologies. Cisco® security technology expert Tom Gillis brings together systematic, timely decision-making and technical guidance for companies of all sizes: information and techniques for protecting collaborative systems without compromising their business benefits. You'll walk through multiple scenarios and case studies, from Cisco Webex® conferencing to social networking to cloud computing. For each scenario, the author identifies key security risks and presents proven best-practice responses, both technical and nontechnical. Securing the Borderless Network reviews the latest Cisco technology solutions for managing identity and securing networks, content, endpoints, and applications. The book concludes by discussing the evolution toward "Web 3.0" applications and the Cisco security vision for the borderless enterprise, providing you with a complete security overview for this quickly evolving network paradigm. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Web 2.0  |x Security measures. 
650 0 |a Online social networks  |x Security measures. 
650 6 |a Web 2.0  |x Sécurité  |x Mesures. 
650 6 |a Réseaux sociaux (Internet)  |x Sécurité  |x Mesures. 
650 7 |a Electrical & Computer Engineering.  |2 hilcc 
650 7 |a Engineering & Applied Sciences.  |2 hilcc 
650 7 |a Telecommunications.  |2 hilcc 
776 0 8 |i Print version:  |z 9786612569005 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781587141287/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37820924 
938 |a Internet Archive  |b INAR  |n securingborderle0000gill 
938 |a Coutts Information Services  |b COUT  |n 13315866 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 256900 
938 |a YBP Library Services  |b YANK  |n 14851834 
938 |a YBP Library Services  |b YANK  |n 15629619 
994 |a 92  |b IZTAP