did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

Securing the Borderless Network Security for the Web 2.0 World

9781587058868

Securing the Borderless Network Security for the Web 2.0 World

  • ISBN 13:

    9781587058868

  • ISBN 10:

    1587058863

  • Edition: 1st
  • Format: Paperback
  • Copyright: 04/09/2010
  • Publisher: Cisco Press
Sorry, this item is currently unavailable.

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Extend or Purchase Your Rental at Any Time

Need to keep your rental past your due date? At any time before your due date you can extend or purchase your rental through your account.

Summary

Today's new Web 2.0, virtualization, mobility, telepresence, and collaborative applications offer immense potential for business advantage. However, they also introduce daunting new security issues - many of which are already being exploited by hackers, crackers, and other cybercriminals. Secure Collaboration is the first book entirely focused on understanding, managing, and mitigating the security risks associated with today's new collaborative technologies. It brings together systematic, up-to-the-minute decision-making and technical guidance for companies of all sizes: specific information, techniques, and best practices for protecting today's new systems without compromising their business benefits. Cisco security technology expert Tom Gillis guides you through several common collaborative scenarios, from Cisco Webex conferencing to social networking and ERP usage. For each, he systematically identifies new and emerging security risks, and presents proven best-practice responses - ranging from revised Acceptable Use and Data Loss Prevention policies to technology solutions. The book's extensive high-level coverage of technology solutions covers Cisco offerings for managing identity, and for securing networks, contents, endpoints, applications, and more. Gillis concludes with a preview of "Web 3.0" - and what it will take to secure those applications, too.

Author Biography

Read more