close menu
Bookswagon-24x7 online bookstore
close menu
My Account
Home > Computing and Information Technology > Computer networking and communications > Network security > Securing the Borderless Network: Security for the Web 2.0 World(English)
Securing the Borderless Network: Security for the Web 2.0 World(English)

Securing the Borderless Network: Security for the Web 2.0 World(English)

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Securing the Borderless Network: Security for the Web 2.0 World Tom Gillis   Securing the Borderless Network reveals New techniques for securing advanced Web 2.0, virtualization, mobility, and collaborative applications   Today’s new Web 2.0, virtualization, mobility, telepresence, and collaborative applications offer immense potential for enhancing productivity and competitive advantage. However, they also introduce daunting new security issues, many of which are already being exploited by cybercriminals. Securing the Borderless Network is the first book entirely focused on helping senior IT decision-makers understand, manage, and mitigate the security risks of these new collaborative technologies.   Cisco® security technology expert Tom Gillis brings together systematic, timely decision-making and technical guidance for companies of all sizes: information and techniques for protecting collaborative systems without compromising their business benefits. You’ll walk through multiple scenarios and case studies, from Cisco Webex® conferencing to social networking to cloud computing. For each scenario, the author identifies key security risks and presents proven best-practice responses, both technical and nontechnical.   Securing the Borderless Network reviews the latest Cisco technology solutions for managing identity and securing networks, content, endpoints, and applications. The book concludes by discussing the evolution toward "Web 3.0" applications and the Cisco security vision for the borderless enterprise, providing you with a complete security overview for this quickly evolving network paradigm.    

Table of Contents:
Foreword xi Introduction xiii Chapter 1 Network Security—Yesterday, Today, and Tomorrow 1 The Evolution of Firewalls 2 Proxy Versus Stateful Inspection 2 From Proxy to Stateful Inspection—and Back Again 4 Endnote 5 Reference 5 Chapter 2 Collaboration and Web 2.0 Technologies 7 Viral Uncertainty Principle 8 Only Connect Digitally 9 Easy Online Collaboration 9 Enterprise-Level Online Collaboration Tools 10 Storage and Applications in the Cloud 11 Endnotes 12 Chapter 3 Building Relationships with Web 2.0 13 Demolishing Communication “Silos” 15 No Future for the Faceless 16 Endnotes 17 References 17 Chapter 4 The Cloud Computing Revolution 19 Managing the “Islands” 20 Disconnected Workflows: Minimal Security 22 Sleeping Easier About Security 24 Endnotes 26 References 26 Chapter 5 You’re in San Jose, I’m in Bangalore—Let’s Meet 27 Breakthrough Technology 28 Travel Costs Drop Dramatically 29 Richer, More Productive Meetings 32 Network Implications 33 Endnotes 35 References 35 Chapter 6 Watson, Can You Hear Us? 37 Human Need for Connectedness 38 Cutting the Cord 39 One Chip Makes You Smaller 41 Handheld Harvest: Apples to BlackBerrys 44 These Unprecedented Times 45 Evolution of the Smartphone 47 Endnotes 49 References 50 Chapter 7 The Consumerization of IT 53 Talkin’ `bout an Evolution 54 Blame It on the Music 55 More Than Just Smartphones 56 Consumerization: A Pull and a Push 57 Safely Consumerizing IT 59 References 60 Chapter 8 The Bad Guys from Outside: Malware 61 Modern Malware Overview 61     Types of Malware 62     Botnets 63     Even Trusted Sites Can’t Be Trusted 64 Finding the Weak Points 64 Social Engineering for Success 65 Spamming and Phishing Get Targeted 67 Profit Motive 70 Endnotes 71 References 71 Chapter 9 Who Are These Guys? 73 The Business of Malware 73 Studying Pharmaceutical Spam 75 Other Links in the Global Chain 77 Taking on the Bad Guys 78 Endnotes 79 References 79 Chapter 10 Signs of Hope 81 Harnessing the Network 82     Bad Guys Team Up 82     Staying in Front of the Threats 83 Scanning for Signatures 83 Behavioral Analysis of Bad Code 84 The Power of Reputation 85 Global Threat Correlation 88 Combining Countermeasures 89 Endnotes 90 Reference 90 Chapter 11 Acceptable Use Policies 91 The Inevitable Evolution of AUPs 91 Gen X/Gen Y “Problem” 92 “Necessary” Noncompliance 94 AUPs Versus the Will of the Employees 96 Endnote 98 References 98 Chapter 12 The Realities of Data Loss 99 One Breach, Multiple Shockwaves 100 Insiders 102 Compliance Pitfall 103 DLP: Chasing Rainbows? 103 Endnotes 104 References 105 Chapter 13 Collaboration Without Confidence 107 Saying “No Thanks” to the “Culture of No” 109 One Workforce, Diverse Needs 111 Secure Collaboration: Anytime, Anywhere, from Any Device 112 Countervailing Forces 114 Endnotes 115 References 116 Chapter 14 Identity Management: We Need to Know if You Are a Dog 117 Identity: The Key to the Security Kingdom 118 Establishing Identity 120 A Flexible Identity Fabric 122 Endnote 123 References 123 Chapter 15 Security for the Borderless Network: Making Web 2.0 and 3.0 Safe for Business 125 Security Policies for the New Open Networked World 126 The Borderless Network Security Architecture 127 Super-Charged Scanners 128 Security Everywhere in the Network 129     Security Intelligence Designed In 130     The Line Between Policy and Enforcement 131     Redefining the Endpoint 132 Collaboration with Confidence 133 Endnote 134 Reference 134     9781587058868    TOC    3/16/2010  


Best Seller

| | See All


Product Details
  • ISBN-13: 9781587058868
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Depth: 14
  • Height: 188 mm
  • No of Pages: 168
  • Spine Width: 10 mm
  • Weight: 299 gr
  • ISBN-10: 1587058863
  • Publisher Date: 22 Apr 2010
  • Binding: Paperback
  • Edition: 1
  • Language: English
  • Series Title: English
  • Sub Title: Security for the Web 2.0 World
  • Width: 231 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Securing the Borderless Network: Security for the Web 2.0 World(English)
Pearson Education (US) -
Securing the Borderless Network: Security for the Web 2.0 World(English)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Securing the Borderless Network: Security for the Web 2.0 World(English)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    | | See All


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA