Text
Securing the borderless network: security for the web 2.0 world
Contents
Chapter 1 Network security-yesterday, today, and tomorrow
Chapter 2 Collaboration and web 2.0 technologies
Chapter 3 Building relationships with web 2.0
Chapter 4 The cloud computing revolution
Chapter 5 You’re in san jose , i’m in bangalore-lets’s meet
Chapter 6 Watson, can ypu hear us ?
Chapter 7 The consumerization of IT
Chapter 8 The bad guys from outside : Malware
Chapter 9 Who are these guys
Chapter 10 Signs of hope
Chapter 11 Acceptable use policies
Chapter 12 The realities of data loss
Chapter 13 Collaboration without confidence
Chapter 14 Identity management : We need to know if you are a dog
Chapter 15 Security for the borderless network : making web 2.0 and 3.0 safe for businnes
No other version available