O'Reilly logo

Securing the Borderless Network: Security for the Web 2.0 World by Tom Gillis

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 15. Security for the Borderless Network: Making Web 2.0 and 3.0 Safe for Business

This chapter includes the following topics:

Security Policies for the New Open Networked World

The Borderless Network Security Architecture

Super-Charged Scanners

Security Everywhere in the Network

Collaboration with Confidence

Now is not the time to plan for a mobile Web 2.0 world. It’s already here, like it or not. Internet-based collaborative work tools. iPhones, BlackBerrys, and growing numbers of other “smart” mobile wireless devices with multimedia and PC-like capabilities. Social networking, instant messaging, and Skype. Virtualization, cloud computing, and SaaS. Cisco WebEx and TelePresence. Remote and mobile working. These trends, technologies, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required