Description |
Tom Gillis. ill. ; 24 cm. Includes bibliographical references and index. Network security : yesterday, today, and tomorrow -- Collaboration and web 2.0 technologies -- Building relationships with web 2.0 -- The cloud computing revolution -- You're in San Jose, I'm in Bangalore, let's meet -- Watson, can you hear us? -- The consumerization of IT -- The bad guys from outside : malware -- Who are these guys? -- Signs of hope -- Acceptable use policies -- The realities of data loss -- Collaboration without confidence -- Identity management : we need to know if you are a dog -- Security for the borderless network : making web 2.0 and 3.0 safe for business.
|
Resources |
L4U Book Cover
|