Securing the Borderless Network by Tom Gillis - Bookswagon
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer security > Privacy and data protection > Securing the Borderless Network: Security for the Web 2.0 World
Securing the Borderless Network: Security for the Web 2.0 World

Securing the Borderless Network: Security for the Web 2.0 World


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Securing the Borderless Network: Security for the Web 2.0 World Tom Gillis   Securing the Borderless Network reveals New techniques for securing advanced Web 2.0, virtualization, mobility, and collaborative applications   Today’s new Web 2.0, virtualization, mobility, telepresence, and collaborative applications offer immense potential for enhancing productivity and competitive advantage. However, they also introduce daunting new security issues, many of which are already being exploited by cybercriminals. Securing the Borderless Network is the first book entirely focused on helping senior IT decision-makers understand, manage, and mitigate the security risks of these new collaborative technologies.   Cisco® security technology expert Tom Gillis brings together systematic, timely decision-making and technical guidance for companies of all sizes: information and techniques for protecting collaborative systems without compromising their business benefits. You’ll walk through multiple scenarios and case studies, from Cisco Webex® conferencing to social networking to cloud computing. For each scenario, the author identifies key security risks and presents proven best-practice responses, both technical and nontechnical.   Securing the Borderless Network reviews the latest Cisco technology solutions for managing identity and securing networks, content, endpoints, and applications. The book concludes by discussing the evolution toward "Web 3.0" applications and the Cisco security vision for the borderless enterprise, providing you with a complete security overview for this quickly evolving network paradigm.    

Table of Contents:
Foreword xi Introduction xiii Chapter 1 Network Security—Yesterday, Today, and Tomorrow 1 The Evolution of Firewalls 2 Proxy Versus Stateful Inspection 2 From Proxy to Stateful Inspection—and Back Again 4 Endnote 5 Reference 5 Chapter 2 Collaboration and Web 2.0 Technologies 7 Viral Uncertainty Principle 8 Only Connect Digitally 9 Easy Online Collaboration 9 Enterprise-Level Online Collaboration Tools 10 Storage and Applications in the Cloud 11 Endnotes 12 Chapter 3 Building Relationships with Web 2.0 13 Demolishing Communication “Silos” 15 No Future for the Faceless 16 Endnotes 17 References 17 Chapter 4 The Cloud Computing Revolution 19 Managing the “Islands” 20 Disconnected Workflows: Minimal Security 22 Sleeping Easier About Security 24 Endnotes 26 References 26 Chapter 5 You’re in San Jose, I’m in Bangalore—Let’s Meet 27 Breakthrough Technology 28 Travel Costs Drop Dramatically 29 Richer, More Productive Meetings 32 Network Implications 33 Endnotes 35 References 35 Chapter 6 Watson, Can You Hear Us? 37 Human Need for Connectedness 38 Cutting the Cord 39 One Chip Makes You Smaller 41 Handheld Harvest: Apples to BlackBerrys 44 These Unprecedented Times 45 Evolution of the Smartphone 47 Endnotes 49 References 50 Chapter 7 The Consumerization of IT 53 Talkin’ ‘bout an Evolution 54 Blame It on the Music 55 More Than Just Smartphones 56 Consumerization: A Pull and a Push 57 Safely Consumerizing IT 59 References 60 Chapter 8 The Bad Guys from Outside: Malware 61 Modern Malware Overview 61     Types of Malware 62     Botnets 63     Even Trusted Sites Can’t Be Trusted 64 Finding the Weak Points 64 Social Engineering for Success 65 Spamming and Phishing Get Targeted 67 Profit Motive 70 Endnotes 71 References 71 Chapter 9 Who Are These Guys? 73 The Business of Malware 73 Studying Pharmaceutical Spam 75 Other Links in the Global Chain 77 Taking on the Bad Guys 78 Endnotes 79 References 79 Chapter 10 Signs of Hope 81 Harnessing the Network 82     Bad Guys Team Up 82     Staying in Front of the Threats 83 Scanning for Signatures 83 Behavioral Analysis of Bad Code 84 The Power of Reputation 85 Global Threat Correlation 88 Combining Countermeasures 89 Endnotes 90 Reference 90 Chapter 11 Acceptable Use Policies 91 The Inevitable Evolution of AUPs 91 Gen X/Gen Y “Problem” 92 “Necessary” Noncompliance 94 AUPs Versus the Will of the Employees 96 Endnote 98 References 98 Chapter 12 The Realities of Data Loss 99 One Breach, Multiple Shockwaves 100 Insiders 102 Compliance Pitfall 103 DLP: Chasing Rainbows? 103 Endnotes 104 References 105 Chapter 13 Collaboration Without Confidence 107 Saying “No Thanks” to the “Culture of No” 109 One Workforce, Diverse Needs 111 Secure Collaboration: Anytime, Anywhere, from Any Device 112 Countervailing Forces 114 Endnotes 115 References 116 Chapter 14 Identity Management: We Need to Know if You Are a Dog 117 Identity: The Key to the Security Kingdom 118 Establishing Identity 120 A Flexible Identity Fabric 122 Endnote 123 References 123 Chapter 15 Security for the Borderless Network: Making Web 2.0 and 3.0 Safe for Business 125 Security Policies for the New Open Networked World 126 The Borderless Network Security Architecture 127 Super-Charged Scanners 128 Security Everywhere in the Network 129     Security Intelligence Designed In 130     The Line Between Policy and Enforcement 131     Redefining the Endpoint 132 Collaboration with Confidence 133 Endnote 134 Reference 134     9781587058868    TOC    3/16/2010  

About the Author :
Tom Gillis is the vice president and general manager for the high-growth Security Technology Business Unit (STBU) at Cisco, where he leads the company’s businesses for security management, appliances, applications, and endpoint services.   Formerly vice president of product management for the Cisco STBU, Gillis was promoted to the VP/GM position after significantly growing its security business and market share. During this time, Gillis successfully led the Cisco product management team and outbound marketing, technical marketing engineering, technical publications, and training organizations.   Prior to his role at Cisco, Gillis was part of the founding team at IronPort Systems and served as senior vice president of marketing when the company was acquired by Cisco. Under his guidance, IronPort grew an average of 100 percent year-on-year for seven years. During his tenure, IronPort rose to become the leading provider of antispam, antivirus, and antimalware appliances for organizations ranging from small businesses to the Global 2000. Before joining IronPort, Gillis worked at iBEAM Broadcasting, Silicon Graphics, and Boston Consulting Group.   Gillis is a recognized leader in the dynamically charged and high-growth Internet security industry, with in-depth knowledge of the challenges surrounding secure network infrastructure. As an author, speaker, and industry executive, he has made invaluable contributions to the security technology community. He has presented at major conferences and events ranging from Gartner Symposiums to Fox News Live. Gillis is also the author of two books, Get the Message and Upping the Anti, a business guide to messaging security.   Gillis holds an M.B.A. degree from Harvard University, and graduated Magna Cum Laude with an M.S.E.E. degree from Northwestern University and a B.S.E.E. from Tufts University.


Best Sellers


Product Details
  • ISBN-13: 9781587141294
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Language: English
  • Sub Title: Security for the Web 2.0 World
  • ISBN-10: 1587141299
  • Publisher Date: 23 Mar 2010
  • Binding: Digital download
  • No of Pages: 169
  • Weight: 1 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Securing the Borderless Network: Security for the Web 2.0 World
Pearson Education (US) -
Securing the Borderless Network: Security for the Web 2.0 World
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Securing the Borderless Network: Security for the Web 2.0 World

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!