TRANSFORMING INFORMATION SECURITY optimizing five concurrent trends to reduce resource drain.
Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | MORIARTY, KATHLEEN M. |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
[S.l.] :
EMERALD GROUP PUBL,
2020.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
Ejemplares similares
-
Information security governance simplified : from the boardroom to the keyboard /
por: Fitzgerald, Todd
Publicado: (2012) -
Information security governance simplified : from the boardroom to the keyboard /
por: Fitzgerald, Todd
Publicado: (2012) -
Information security handbook : develop a threat model and incident response strategy to build a strong information security framework /
por: Death, Darren
Publicado: (2017) -
Information security handbook : develop a threat model and incident response strategy to build a strong information security framework /
por: Death, Darren
Publicado: (2017) -
Trusted Computing : Principles and Applications.
por: Feng, Dengguo
Publicado: (2017)