MARC Record |
001 16142736
005 20110125093655.0
008 100318s2010 inuab 001 0 eng
010 $a 2010007239
020 $a978-1-58705-886-8$c$119.70
020 $a1-58705-886-3
035 $a(OCoLC)ocn308171231
037 $bMIS$bCisco Press
040 $aDLC$cDLC$dYDX$dYDXCP$dBWX$dDLC
050 00$aTK5105.88817$b.G55 2010
082 00$222$a005.8
100 1 $aGillis, Tom
245 10$aSecuring the borderless network :$bsecurity for the web 2.0 world$cTom Gillis.$hPaperback{PBK}
260 $aIndianapolis, IN$bCisco Press$cc2010
300 $axvi, 148 p.$bill. ;$c24 cm.
504 $aIncludes bibliographical references and index.
505 0 $aNetwork security : yesterday, today, and tomorrow --
Collaboration and web 2.0 technologies -- Building
relationships with web 2.0 -- The cloud computing revolution --
You're in San Jose, I'm in Bangalore, let's meet --
Watson, can you hear us? -- The consumerization of IT
-- The bad guys from outside : malware -- Who are these
guys? -- Signs of hope -- Acceptable use policies --
The realities of data loss -- Collaboration without
confidence -- Identity management : we need to know if
you are a dog -- Security for the borderless network :
making web 2.0 and 3.0 safe for business.
521 $aUniversitar
541 $d03/03/2011
590 $aENG
650 0$aWeb 2.0$xSecurity measures.
650 0$aOnline social networks$xSecurity measures.
650 0$aSecuritate informatica.
650 0$asecuritatea informatiei
650 0$asecuritatea informatiei electronice
650 0$ainformatica
852 $90$bSala de lectura 1{Saladele}$cStudent{S}$kRegular{REG}$t1$zArrived$p034350$iGIL$h7362$qExc
906 $a7$bcbc$corignew$d1$eecip$f20$gy-gencatlg
925 0 $aacquire$b2 shelf copies$xpolicy default
955 $axe10 2010-06-24 1 copy rec'd., to CIP ver.$axh00 2010-06-28 to USPL/STM$bxh12 2010-03-18$fxh16 2010-08-05 Z-CipVer to BCCD$ixh12 2010-03-18$txg22 2011-01-25 copy 2 added$wrd11 2010-03-18
034350 Securing the borderless network :
|