Cargando…

The second economy : the race for trust, treasure and time in the cybersecurity war /

Gain a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace to lead and thrive in an ever-shifting environment. In today's hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, vi...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Grobman, Steve (Autor), Cerra, Allison (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [New York, New York] : Apress, [2016]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn971245759
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 170203s2016 nyu ob 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d UMI  |d STF  |d OCLCA  |d OCLCF  |d CEF  |d KSU  |d OCLCQ  |d DEBBG  |d UAB  |d HS0  |d OCLCO  |d OCL  |d OCLCQ 
019 |a 1108987553  |a 1165383356 
020 |a 9781484222294 
020 |a 1484222296 
020 |z 9781484222287 
024 7 |a 10.1007/978-1-4842-2229-4.  |2 doi 
029 1 |a GBVCP  |b 897166264 
035 |a (OCoLC)971245759  |z (OCoLC)1108987553  |z (OCoLC)1165383356 
037 |a CL0500000826  |b Safari Books Online 
050 4 |a TK5105.59 
072 7 |a UKN.  |2 bicssc 
072 7 |a COM075000.  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
049 |a UAMI 
100 1 |a Grobman, Steve,  |e author. 
245 1 4 |a The second economy :  |b the race for trust, treasure and time in the cybersecurity war /  |c Steve Grobman, Allison Cerra ; foreword by Christopher Young. 
264 1 |a [New York, New York] :  |b Apress,  |c [2016] 
264 2 |a New York, NY :  |b Distributed by Springer Science+Business Media New York 
264 4 |c ©2016 
300 |a 1 online resource (1 volume) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
588 0 |a Online resource; title from title page (viewed February 1, 2017). 
500 |a Place of publication from publisher's Web site (viewed February 1, 2017). 
504 |a Includes bibliographical references and index. 
505 0 |a Prologue -- Chapter 1: The Second Side of the Story -- Chapter 2: The Second Nature of Markets -- Chapter 3: Seconding the Cause -- Chapter 4: No Second Chance -- Chapter 5: Second Guessing the Obvious -- Chapter 6: Playing Second Fiddle -- Chapter 7: Take a Second Look -- Chapter 8: When Seconds Matter -- Chapter 9: Second to None -- Chapter 10: Cybersecurity's Second Wind -- Epilogue. 
520 |a Gain a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace to lead and thrive in an ever-shifting environment. In today's hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, virtually every step we take, every transaction we initiate, and every interaction we have are supported in some way by this vast global infrastructure. This set of interconnected systems comprises the fundamental building blocks of the second economy - the very foundation of our first economy. And adversaries, whether motivated by profit, principle or province, are singularly focused on winning the race through a relentless portfolio of shifting attack vectors. Make no mistake about it, we are running a race. This is a race against a faceless, nameless adversary - one that dictates the starting line, the rules of the road, and what trophies are at stake. Established assumptions must be challenged, strategies must be revised, and long-held practices must be upended to run this race and effectively compete. The Second Economy highlights a second to none approach in this fight, as the effectiveness and ROI of security solutions are increasingly measured by the business outcomes they enable. What You Will Learn: Understand the value of time and trust in a cyber-warfare world Enable agile and intelligent organizations to minimize their risk of falling victim to the next attack Accelerate response time by adopting a holistic approach Eliminate friction across the threat defense lifecycle, from protection to detection to correction Gain a sustainable competitive advantage by seizing first mover advantage Deploy solutions across an open, integrated security framework Who This Book Is For: Senior-level IT decision makers concerned with ascribing business value to a robust security strategy. The book also addresses business decision makers who must be educated about the pervasive and growing cyber threatscape (including CXOs, board directors, and functional leaders) as well as general business employees to understand how they may become unwitting participants in a complex cyber war. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Cyberspace  |x Security measures. 
650 0 |a Cyberterrorism. 
650 0 |a Computer crimes. 
650 0 |a Computer security. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Cyberterrorisme. 
650 6 |a Criminalité informatique. 
650 6 |a Sécurité informatique. 
650 7 |a Cyberspace  |x Security measures.  |2 fast  |0 (OCoLC)fst02031378 
650 7 |a Computer crimes.  |2 fast  |0 (OCoLC)fst00872063 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Cyberterrorism.  |2 fast  |0 (OCoLC)fst00885802 
700 1 |a Cerra, Allison,  |e author. 
776 |z 1-4842-2228-8 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484222294/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP