Cargando…

TRANSFORMING INFORMATION SECURITY optimizing five concurrent trends to reduce resource drain.

Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: MORIARTY, KATHLEEN M.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [S.l.] : EMERALD GROUP PUBL, 2020.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000M 4500
001 EBOOKCENTRAL_on1160094116
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 200629s2020 xx o 0|| 0 eng d
040 |a YDX  |b eng  |c YDX  |d EBLCP  |d UKAHL  |d UKMGB  |d OCLCF  |d OCLCO  |d SFB  |d N$T  |d OCLCO  |d K6U  |d OCLCQ  |d OCLCO  |d OCLCL 
015 |a GBC080080  |2 bnb 
016 7 |a 019826606  |2 Uk 
019 |a 1163475139 
020 |a 9781839099304  |q (electronic bk.) 
020 |a 1839099305  |q (electronic bk.) 
020 |a 9781839099281  |q (PDF ebook) 
020 |a 1839099283 
020 |z 1839099313 
020 |z 9781839099311 
029 1 |a UKMGB  |b 019826606 
029 1 |a AU@  |b 000068213791 
035 |a (OCoLC)1160094116  |z (OCoLC)1163475139 
037 |a 9781839099304  |b Emerald Publishing 
050 4 |a ZA4450-4460 
080 |a 004.62 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a MORIARTY, KATHLEEN M. 
245 1 0 |a TRANSFORMING INFORMATION SECURITY  |h [electronic resource] :  |b optimizing five concurrent trends to reduce resource drain. 
260 |a [S.l.] :  |b EMERALD GROUP PUBL,  |c 2020. 
300 |a 1 online resource 
336 |a text  |2 rdacontent 
337 |a computer  |2 rdamedia 
338 |a online resource  |2 rdacarrier 
520 |a Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space. 
505 0 |a Chapter 1. Interconnected trends -- Chapter 2. Board level program evaluation and guidance -- Chapter 3. Architect a secure network with less -- Chapter 4. Encryption -- Chapter 5. Transport evolution: The encrypted stack -- Chapter 6. Authentication and authorization -- Chapter 7. The end point -- Chapter 8. Incident prevention, detection, and response -- Chapter 9. Looking forward. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a Emerald Insight  |b Emerald All Book Titles 
650 0 |a Information networks  |x Security measures. 
650 0 |a Information technology  |x Management. 
650 0 |a Information resources management. 
650 6 |a Réseaux d'information  |x Sécurité  |x Mesures. 
650 6 |a Technologie de l'information  |x Gestion. 
650 6 |a Gestion de l'information. 
650 7 |a Data encryption.  |2 bicssc 
650 7 |a Computers, Security  |x General.  |2 bisacsh 
650 7 |a Information networks  |x Security measures  |2 fast 
650 7 |a Information resources management  |2 fast 
650 7 |a Information technology  |x Management  |2 fast 
758 |i has work:  |a Transforming information security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFYBpTbq3Yc6hjRhwFgcpq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |z 1839099313  |z 9781839099311  |w (OCoLC)1153005593 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=6232221  |z Texto completo 
856 4 0 |u https://www.emerald.com/insight/publication/doi/10.1108/9781839099281  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37370070 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37370069 
938 |a YBP Library Services  |b YANK  |n 16820571 
938 |a YBP Library Services  |b YANK  |n 301350119 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6232221 
938 |a EBSCOhost  |b EBSC  |n 2409838 
994 |a 92  |b IZTAP