Securing the borderless network security for the web 2.0 world
Securing the Borderless Network: Security for the Web 2.0 World Tom Gillis Securing the Borderless Network reveals New techniques for securing advanced Web 2.0, virtualization, mobility, and collaborative applications Today’s new Web 2.0, virtualization, mobility, telepresence, and collaborative app...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Indianapolis, IN :
Cisco Press
c2010.
|
Edición: | 1st edition |
Colección: | Networking Technology: Security
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629118006719 |
Tabla de Contenidos:
- Network security : yesterday, today, and tomorrow
- Collaboration and web 2.0 technologies
- Building relationships with web 2.0
- The cloud computing revolution
- You're in San Jose, I'm in Bangalore, let's meet
- Watson, can you hear us?
- The consumerization of IT
- The bad guys from outside : malware
- Who are these guys?
- Signs of hope
- Acceptable use policies
- The realities of data loss
- Collaboration without confidence
- Identity management : we need to know if you are a dog
- Security for the borderless network : making web 2.0 and 3.0 safe for business.