Contents
Chapter 1. Network Security—Yesterday, Today, and Tomorrow
Proxy Versus Stateful Inspection
From Proxy to Stateful Inspection—and Back Again
Chapter 2. Collaboration and Web 2.0 Technologies
Enterprise-Level Online Collaboration Tools
Storage and Applications in the Cloud
Chapter 3. Building Relationships with Web 2.0
Demolishing Communication “Silos”
Chapter 4. The Cloud Computing Revolution
Disconnected Workflows: Minimal Security
Get Securing the Borderless Network: Security for the Web 2.0 World now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.