Securing the Borderless Network: Security for the Web 2.0 World Review

Securing the Borderless Network: Security for the Web 2.0 World
Average Reviews:

(More customer reviews)
I am giving this four stars because in June 2010, this really helps me see the big picture from a seasoned tech executive, Harvard MBA's point of view. Through no fault of his own, the manuscript will age fast and be less valuable fast. For instance, chapter 6 doesn't have the iPad however, it does have the Apple Newton from 1993. There is a lot of history built into Gillis's research and I found that really helpful, we have to know where we have been to understand where we are going. If you need to understand the emerging trends in security and computing in general and it is still 2010, I recommend you buy this book. If it is later than 2010 and it is not second edition or updated, ask around for a copy to borrow. I guess I am a bit of a Gillis fan, I only recycled his Get the Message from 2004 last month.

Click Here to see more reviews about: Securing the Borderless Network: Security for the Web 2.0 World

Securing the Borderless Network: Security for the Web 2.0 WorldTom GillisSecuring the Borderless Network reveals New techniques for securing advanced Web 2.0, virtualization, mobility, and collaborative applicationsToday's new Web 2.0, virtualization, mobility, telepresence, and collaborative applications offer immense potential for enhancing productivity and competitive advantage. However, they also introduce daunting new security issues, many of which are already being exploited by cybercriminals. Securing the Borderless Network is the first book entirely focused on helping senior IT decision-makers understand, manage, and mitigate the security risks of these new collaborative technologies. Cisco® security technology expert Tom Gillis brings together systematic, timely decision-making and technical guidance for companies of all sizes: information and techniques for protecting collaborative systems without compromising their business benefits. You'll walk through multiple scenarios and case studies, from Cisco Webex® conferencing to social networking to cloud computing. For each scenario, the author identifies key security risks and presents proven best-practice responses, both technical and nontechnical. Securing the Borderless Network reviews the latest Cisco technology solutions for managing identity and securing networks, content, endpoints, and applications. The book concludes by discussing the evolution toward "Web 3.0" applications and the Cisco security vision for the borderless enterprise, providing you with a complete security overview for this quickly evolving network paradigm.

Buy Now

Click here for more information about Securing the Borderless Network: Security for the Web 2.0 World

0 comments:

Post a Comment