Ebook Securing the Borderless Network: Security for the Web 2.0 World
Utilize the innovative modern technology that human develops today to locate guide Securing The Borderless Network: Security For The Web 2.0 World quickly. However initially, we will certainly ask you, how much do you enjoy to check out a book Securing The Borderless Network: Security For The Web 2.0 World Does it constantly until finish? Wherefore does that book review? Well, if you really love reading, aim to read the Securing The Borderless Network: Security For The Web 2.0 World as one of your reading collection. If you only checked out guide based on demand at the time and also unfinished, you have to aim to like reading Securing The Borderless Network: Security For The Web 2.0 World first.
Securing the Borderless Network: Security for the Web 2.0 World
Ebook Securing the Borderless Network: Security for the Web 2.0 World
Thanks for visiting our amazing web site. This is an internet site that could make everybody really feel so eased. This is the one that will certainly offer all competed book collections from the authors around the globe. Locating guide from various other nations in this rest is simple, additionally to discover guides for within the country. That will certainly be so easy then.
Related to exactly what occur in this situation, it doesn't imply that enjoyment will certainly be constantly fiction. Right here, we will reveal you how a publication can offer the home entertainment as well as factual kinds to review. The book is Securing The Borderless Network: Security For The Web 2.0 World Do you learn about it? Certainly, this is a really well-known book that is also produced by a well-known author.
Whatever your condition, reading will certainly always offer you simple circumstance to be much enjoyable. Yeah, the amusement publication will certainly show you its power to earn people rejoice and laugh. The social publication will certainly provide you new knowledge day-to-day regarding this life and also social connection. Politics and also spiritual, something is huge now. It is likewise concerning how individuals will certainly honour publication, every type of book as the referred analysis product. We could start it from the Securing The Borderless Network: Security For The Web 2.0 World
When you have actually determined that this is likewise your preferred book, you should inspect as well as obtain Securing The Borderless Network: Security For The Web 2.0 World sooner. Be the to start with people as well as accompany them to take pleasure in the details associated about. To obtain more reference, we will show you the link to get and download guide. Also Securing The Borderless Network: Security For The Web 2.0 World that we offer in this website is type of soft file book; it doesn't imply that the material will certainly be decreased. It's still to be the one that will influence you.
From the Back Cover
Securing the Borderless Network: Security for the Web 2.0 WorldTom Gillis Securing the Borderless Networkreveals New techniques for securing advanced Web 2.0, virtualization, mobility, and collaborative applications Today's new Web 2.0, virtualization, mobility, telepresence, and collaborative applications offer immense potential for enhancing productivity and competitive advantage. However, they also introduce daunting new security issues, many of which are already being exploited by cybercriminals. Securing the Borderless Network is the first book entirely focused on helping senior IT decision-makers understand, manage, and mitigate the security risks of these new collaborative technologies. Cisco® security technology expert Tom Gillis brings together systematic, timely decision-making and technical guidance for companies of all sizes: information and techniques for protecting collaborative systems without compromising their business benefits. You'll walk through multiple scenarios and case studies, from Cisco Webex® conferencing to social networking to cloud computing. For each scenario, the author identifies key security risks and presents proven best-practice responses, both technical and nontechnical. Securing the Borderless Network reviews the latest Cisco technology solutions for managing identity and securing networks, content, endpoints, and applications. The book concludes by discussing the evolution toward "Web 3.0" applications and the Cisco security vision for the borderless enterprise, providing you with a complete security overview for this quickly evolving network paradigm.
Read more
About the Author
Tom Gillis is the vice president and general manager for the high-growth Security Technology Business Unit (STBU) at Cisco, where he leads the company’s businesses for security management, appliances, applications, and endpoint services. Formerly vice president of product management for the Cisco STBU, Gillis was promoted to the VP/GM position after significantly growing its security business and market share. During this time, Gillis successfully led the Cisco product management team and outbound marketing, technical marketing engineering, technical publications, and training organizations. Prior to his role at Cisco, Gillis was part of the founding team at IronPort Systems and served as senior vice president of marketing when the company was acquired by Cisco. Under his guidance, IronPort grew an average of 100 percent year-on-year for seven years. During his tenure, IronPort rose to become the leading provider of antispam, antivirus, and antimalware appliances for organizations ranging from small businesses to the Global 2000. Before joining IronPort, Gillis worked at iBEAM Broadcasting, Silicon Graphics, and Boston Consulting Group. Gillis is a recognized leader in the dynamically charged and high-growth Internet security industry, with in-depth knowledge of the challenges surrounding secure network infrastructure. As an author, speaker, and industry executive, he has made invaluable contributions to the security technology community. He has presented at major conferences and events ranging from Gartner Symposiums to Fox News Live. Gillis is also the author of two books, Get the Message and Upping the Anti, a business guide to messaging security. Gillis holds an M.B.A. degree from Harvard University, and graduated Magna Cum Laude with an M.S.E.E. degree from Northwestern University and a B.S.E.E. from Tufts University.
Read more
Product details
Paperback: 168 pages
Publisher: Cisco Press; 1 edition (April 19, 2010)
Language: English
ISBN-10: 1587058863
ISBN-13: 978-1587058868
Product Dimensions:
7.3 x 0.4 x 9.1 inches
Shipping Weight: 11.2 ounces (View shipping rates and policies)
Average Customer Review:
4.2 out of 5 stars
14 customer reviews
Amazon Best Sellers Rank:
#939,136 in Books (See Top 100 in Books)
WEB security for the Web 2.0 work.This book takes the reader immediately to an area that is revolutionizing the way we conduct business. The author walks us from the evolution of Firewall and the impact that each new technology such as Cloud Computing, portable devices have on the business environment. It is not only a book that looks at the various technological advancement, it also advocates the social and business benefits of shifting technological paradigms. As illustrated by the author, Tom Gillis --"Change creates winners and losers. The basic principle of Darwinism suggests that is not the strongest species that survive, not the most intelligent, but the most adaptive to change". The book Security for the Web 2.0 world is a testament of things to come, and cautiously remind us of "irrational exuberance" of the past and present.Mario Camilien, CISSP, CHSS, SCNPInformation Security Analyst
Cisco is making a big push into cloud computing and the much bruited Web 2.0. Gillis explains these trends in a concise way, and tries to minimise the technical jargon.The first chapter is distinguished by an excellent summary of how firewalls work. Gillis skips all the low level product details that you typically find in other discussions about firewalls. Instead, he describes that all firewalls are divided into 2 types - proxy and packet filters. And that the latter are now largely represented by stateful packet filters. The relative merits of these are given, along with the trends in the last 15 or so years. If you have another book devoted to firewalls, consider perhaps first reading this chapter of Gillis to orient yourself before plunging into the former.Gillis then goes on to talk about cloud computing. Note however that the two example companies he covers are small. They don't have and cannot afford much in the way of dedicated IT people or equipment. So perhaps for situations like theirs, a so-called cloud remote access, where their data is hosted on some third party data center, makes sense. More plausibly, cloud computing usage may indeed expand, but likely there will always be both cases; of companies using it and others going with their own data centers.The book also delves into the various manifestations of malware, like viruses, botnets, spam and phishing. If you want more details, try Malware: Fighting Malicious Code or The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System.
This book is an entertaining and fun read and any technology enthusiast should read it. I was able to read this book in two nights and enjoyed it like I was reading Dan Brown's Angels and Demons. The author Tom Gillis clearly explains new challenges faced by IT Security Managers due to Web 2.0, Cloud Computing and mobile workforce. The author clearly explains why Web 2.0 and Cloud Computing are Enterprise management's biggest fear and clearly expose IT's inflexibility. Web 2.0 gives rise to Work 2.0 and whether IT departments like it or not, this trend is here to stay. Today employees work anytime from anywhere using any device and need connectivity 24x7x365 which increases their productivity and job satisfaction. But this trend is major headache for C-Level enterprise executives and IT Security managers as they don't know how to secure this information flow when communication may not even touch their networks like Salesforce hosting your company's CRM and employee access this data using his iPhone. Traditional network boundaries are blurring and it is becoming very difficult to protect data whether it is in motion or rest. Tom also explains Next Generation Firewalls that will not do filtering based on port, protocol and IP but instead will be Content, Application and User Identity aware. How about writing a firewall policy saying "John Doe" from "Engineering" department can access "[...]" and cannot exceed "2 Mbps"instead of IP address x.x.x.x/32 can access y.y.y.y/32 on port 80. I think you got the point :-)The problem statement is clearly defined with many excellent examples and interview excerpts from real enterprises. Last few chapters are fully focused on highlighting solutions for Web 2.0 security challenges and I have to admit, Cisco vision is neat and they are focusing on both On-Prem and Cloud based security solutions. The author didn't go into implementation or design details but ideas like Flexible Identity Fabric and multilayer scanning engines are pretty encouraging. The concept of Policy Management consoles (where enforcement and Policy management functions are decoupled) along with Security Intelligence Operations (SIO) are good initiatives by Cisco.Overall I thoroughly enjoyed this book and in my opinion the content is very well organized, timely and fresh. Tom Gillis is very knowledgeable and he certainly delivered a book that will benefit many IT managers,executives and staff members.Shahid Shafi CCIE#12665 (RS,Security,SP)
Securing the Borderless Network by Tom Gillis is more of a history lesson than anything else. It's kind of interesting for someone that lived through these events to see a different perspective. The term Web 2.0 is used heavily in various contexts and, I suppose, is as accurate in its use as anyone else. It seems everyone and their dog (whether you know they're a dog or not) has a different take on just what Web 2.0 means to the consumers and creators of information.As of the book's publication Mr. Gillis is VP and GM of the Security Technology Business Unit at cisco so much of the book is from the cisco viewpoint. That's not necessarily a bad thing, just be prepared as you may get the impression that only cisco is involved in making the world's information and its access safe for mankind. This is a relatively small book at a little over 130 pages and a pretty quick read. I recommend it as something to leave on the table in the Executive Lounge a few weeks before you have to present why you actually need to spend some money on information security solutions.Overall, a good quick read and a fast education for the C-level world.
Securing the Borderless Network: Security for the Web 2.0 World PDF
Securing the Borderless Network: Security for the Web 2.0 World EPub
Securing the Borderless Network: Security for the Web 2.0 World Doc
Securing the Borderless Network: Security for the Web 2.0 World iBooks
Securing the Borderless Network: Security for the Web 2.0 World rtf
Securing the Borderless Network: Security for the Web 2.0 World Mobipocket
Securing the Borderless Network: Security for the Web 2.0 World Kindle
0 komentar:
Posting Komentar