Download Ebook Securing the Borderless Network: Security for the Web 2.0 World
Find your personal web page to be complied with exactly what your need is. But, always remember. It is a fantastic book. You can discover it as one of the most recommended publication in this day. When you have actually discovered as well as got it, do not just consider the particular page. All pages interest in valuable and important information. It will certainly influence you how to get the best thing while analysis.
Securing the Borderless Network: Security for the Web 2.0 World
Download Ebook Securing the Borderless Network: Security for the Web 2.0 World
Dear viewers, when you are hunting the brand-new book collection to read this day, Securing The Borderless Network: Security For The Web 2.0 World can be your referred publication. Yeah, even several books are used, this book could take the reader heart a lot. The material and also theme of this publication actually will touch your heart. You can discover an increasing number of experience as well as understanding exactly how the life is undertaken.
When having free time, what should you do? Only sleeping or sitting in the house? Complete your free time by analysis. Start from now, you time should be valuable. One to extend that can be checking out product; this is it Securing The Borderless Network: Security For The Web 2.0 World This publication is supplied not just for being the material analysis. You recognize, from seeing the title and also the name of writer, you need to know just how the quality of this book. Even the writer and also title are not the one that determines guide is good or otherwise, you could contrast t with the experience and understanding that the writer has.
By soft file of guide Securing The Borderless Network: Security For The Web 2.0 World to review, you may not should bring the thick prints anywhere you go. Whenever you have eager to review Securing The Borderless Network: Security For The Web 2.0 World, you can open your gadget to read this book Securing The Borderless Network: Security For The Web 2.0 World in soft documents system. So very easy and quick! Reviewing the soft file book Securing The Borderless Network: Security For The Web 2.0 World will offer you simple way to review. It can also be faster considering that you can review your publication Securing The Borderless Network: Security For The Web 2.0 World almost everywhere you really want. This on-line Securing The Borderless Network: Security For The Web 2.0 World could be a referred e-book that you can appreciate the solution of life.
When other peoples are still waiting on guide available in the book store, you have actually done the great way. By seeing this site, you have actually been two steps forward. Yeah, in this site, the soft file of the Securing The Borderless Network: Security For The Web 2.0 World is noted. So, you will certainly not go out to have it as yours. In this website, you will certainly find the web link as well as the link will lead you to obtain the book documents directly.
From the Back Cover
Securing the Borderless Network: Security for the Web 2.0 WorldTom Gillis Securing the Borderless Networkreveals New techniques for securing advanced Web 2.0, virtualization, mobility, and collaborative applications Today's new Web 2.0, virtualization, mobility, telepresence, and collaborative applications offer immense potential for enhancing productivity and competitive advantage. However, they also introduce daunting new security issues, many of which are already being exploited by cybercriminals. Securing the Borderless Network is the first book entirely focused on helping senior IT decision-makers understand, manage, and mitigate the security risks of these new collaborative technologies. Cisco® security technology expert Tom Gillis brings together systematic, timely decision-making and technical guidance for companies of all sizes: information and techniques for protecting collaborative systems without compromising their business benefits. You'll walk through multiple scenarios and case studies, from Cisco Webex® conferencing to social networking to cloud computing. For each scenario, the author identifies key security risks and presents proven best-practice responses, both technical and nontechnical. Securing the Borderless Network reviews the latest Cisco technology solutions for managing identity and securing networks, content, endpoints, and applications. The book concludes by discussing the evolution toward "Web 3.0" applications and the Cisco security vision for the borderless enterprise, providing you with a complete security overview for this quickly evolving network paradigm.
Read more
About the Author
Tom Gillis is the vice president and general manager for the high-growth Security Technology Business Unit (STBU) at Cisco, where he leads the company’s businesses for security management, appliances, applications, and endpoint services. Formerly vice president of product management for the Cisco STBU, Gillis was promoted to the VP/GM position after significantly growing its security business and market share. During this time, Gillis successfully led the Cisco product management team and outbound marketing, technical marketing engineering, technical publications, and training organizations. Prior to his role at Cisco, Gillis was part of the founding team at IronPort Systems and served as senior vice president of marketing when the company was acquired by Cisco. Under his guidance, IronPort grew an average of 100 percent year-on-year for seven years. During his tenure, IronPort rose to become the leading provider of antispam, antivirus, and antimalware appliances for organizations ranging from small businesses to the Global 2000. Before joining IronPort, Gillis worked at iBEAM Broadcasting, Silicon Graphics, and Boston Consulting Group. Gillis is a recognized leader in the dynamically charged and high-growth Internet security industry, with in-depth knowledge of the challenges surrounding secure network infrastructure. As an author, speaker, and industry executive, he has made invaluable contributions to the security technology community. He has presented at major conferences and events ranging from Gartner Symposiums to Fox News Live. Gillis is also the author of two books, Get the Message and Upping the Anti, a business guide to messaging security. Gillis holds an M.B.A. degree from Harvard University, and graduated Magna Cum Laude with an M.S.E.E. degree from Northwestern University and a B.S.E.E. from Tufts University.
Read more
Product details
Paperback: 168 pages
Publisher: Cisco Press; 1 edition (April 19, 2010)
Language: English
ISBN-10: 1587058863
ISBN-13: 978-1587058868
Product Dimensions:
7.3 x 0.4 x 9.1 inches
Shipping Weight: 11.2 ounces (View shipping rates and policies)
Average Customer Review:
4.2 out of 5 stars
14 customer reviews
Amazon Best Sellers Rank:
#939,136 in Books (See Top 100 in Books)
WEB security for the Web 2.0 work.This book takes the reader immediately to an area that is revolutionizing the way we conduct business. The author walks us from the evolution of Firewall and the impact that each new technology such as Cloud Computing, portable devices have on the business environment. It is not only a book that looks at the various technological advancement, it also advocates the social and business benefits of shifting technological paradigms. As illustrated by the author, Tom Gillis --"Change creates winners and losers. The basic principle of Darwinism suggests that is not the strongest species that survive, not the most intelligent, but the most adaptive to change". The book Security for the Web 2.0 world is a testament of things to come, and cautiously remind us of "irrational exuberance" of the past and present.Mario Camilien, CISSP, CHSS, SCNPInformation Security Analyst
Cisco is making a big push into cloud computing and the much bruited Web 2.0. Gillis explains these trends in a concise way, and tries to minimise the technical jargon.The first chapter is distinguished by an excellent summary of how firewalls work. Gillis skips all the low level product details that you typically find in other discussions about firewalls. Instead, he describes that all firewalls are divided into 2 types - proxy and packet filters. And that the latter are now largely represented by stateful packet filters. The relative merits of these are given, along with the trends in the last 15 or so years. If you have another book devoted to firewalls, consider perhaps first reading this chapter of Gillis to orient yourself before plunging into the former.Gillis then goes on to talk about cloud computing. Note however that the two example companies he covers are small. They don't have and cannot afford much in the way of dedicated IT people or equipment. So perhaps for situations like theirs, a so-called cloud remote access, where their data is hosted on some third party data center, makes sense. More plausibly, cloud computing usage may indeed expand, but likely there will always be both cases; of companies using it and others going with their own data centers.The book also delves into the various manifestations of malware, like viruses, botnets, spam and phishing. If you want more details, try Malware: Fighting Malicious Code or The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System.
This book is an entertaining and fun read and any technology enthusiast should read it. I was able to read this book in two nights and enjoyed it like I was reading Dan Brown's Angels and Demons. The author Tom Gillis clearly explains new challenges faced by IT Security Managers due to Web 2.0, Cloud Computing and mobile workforce. The author clearly explains why Web 2.0 and Cloud Computing are Enterprise management's biggest fear and clearly expose IT's inflexibility. Web 2.0 gives rise to Work 2.0 and whether IT departments like it or not, this trend is here to stay. Today employees work anytime from anywhere using any device and need connectivity 24x7x365 which increases their productivity and job satisfaction. But this trend is major headache for C-Level enterprise executives and IT Security managers as they don't know how to secure this information flow when communication may not even touch their networks like Salesforce hosting your company's CRM and employee access this data using his iPhone. Traditional network boundaries are blurring and it is becoming very difficult to protect data whether it is in motion or rest. Tom also explains Next Generation Firewalls that will not do filtering based on port, protocol and IP but instead will be Content, Application and User Identity aware. How about writing a firewall policy saying "John Doe" from "Engineering" department can access "[...]" and cannot exceed "2 Mbps"instead of IP address x.x.x.x/32 can access y.y.y.y/32 on port 80. I think you got the point :-)The problem statement is clearly defined with many excellent examples and interview excerpts from real enterprises. Last few chapters are fully focused on highlighting solutions for Web 2.0 security challenges and I have to admit, Cisco vision is neat and they are focusing on both On-Prem and Cloud based security solutions. The author didn't go into implementation or design details but ideas like Flexible Identity Fabric and multilayer scanning engines are pretty encouraging. The concept of Policy Management consoles (where enforcement and Policy management functions are decoupled) along with Security Intelligence Operations (SIO) are good initiatives by Cisco.Overall I thoroughly enjoyed this book and in my opinion the content is very well organized, timely and fresh. Tom Gillis is very knowledgeable and he certainly delivered a book that will benefit many IT managers,executives and staff members.Shahid Shafi CCIE#12665 (RS,Security,SP)
Securing the Borderless Network by Tom Gillis is more of a history lesson than anything else. It's kind of interesting for someone that lived through these events to see a different perspective. The term Web 2.0 is used heavily in various contexts and, I suppose, is as accurate in its use as anyone else. It seems everyone and their dog (whether you know they're a dog or not) has a different take on just what Web 2.0 means to the consumers and creators of information.As of the book's publication Mr. Gillis is VP and GM of the Security Technology Business Unit at cisco so much of the book is from the cisco viewpoint. That's not necessarily a bad thing, just be prepared as you may get the impression that only cisco is involved in making the world's information and its access safe for mankind. This is a relatively small book at a little over 130 pages and a pretty quick read. I recommend it as something to leave on the table in the Executive Lounge a few weeks before you have to present why you actually need to spend some money on information security solutions.Overall, a good quick read and a fast education for the C-level world.
Securing the Borderless Network: Security for the Web 2.0 World PDF
Securing the Borderless Network: Security for the Web 2.0 World EPub
Securing the Borderless Network: Security for the Web 2.0 World Doc
Securing the Borderless Network: Security for the Web 2.0 World iBooks
Securing the Borderless Network: Security for the Web 2.0 World rtf
Securing the Borderless Network: Security for the Web 2.0 World Mobipocket
Securing the Borderless Network: Security for the Web 2.0 World Kindle
No Response to "Download Ebook Securing the Borderless Network: Security for the Web 2.0 World"
Post a Comment