Cargando…

Five technological forces disrupting security : how cloud, social, mobile, big data and IoT are transforming physical security in the digital age /

The Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age explores the major technological forces currently driving digital disruption in the security industry, and what they foretell for the future. The book...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Till, Steve Van (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Oxford, United Kingdom ; Cambridge, MA, United States : Butterworth-Heinemann is an imprint of Elsevier, [2018]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 SCIDIR_on1001571857
003 OCoLC
005 20231120010214.0
006 m o d
007 cr cnu|||unuuu
008 170823t20182018enk ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d IDEBK  |d EBLCP  |d N$T  |d OPELS  |d MERER  |d TEFOD  |d YDX  |d UPM  |d OCLCA  |d D6H  |d U3W  |d OCLCF  |d MERUC  |d OCLCQ  |d WYU  |d MNW  |d TSC  |d ABC  |d OCLCQ  |d S2H  |d OCLCO  |d UX1  |d VT2  |d OCLCQ  |d DKU  |d OCLCQ  |d OCLCO  |d K6U  |d OCLCQ  |d BRX  |d OCLCQ 
019 |a 1001801730  |a 1066454650  |a 1235117702  |a 1235842953 
020 |a 9780128050965  |q (electronic bk.) 
020 |a 0128050969  |q (electronic bk.) 
020 |z 9780128050958 
020 |z 0128050950 
035 |a (OCoLC)1001571857  |z (OCoLC)1001801730  |z (OCoLC)1066454650  |z (OCoLC)1235117702  |z (OCoLC)1235842953 
050 4 |a TK5105.59 
072 7 |a COM  |x 043050  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
100 1 |a Till, Steve Van,  |e author. 
245 1 0 |a Five technological forces disrupting security :  |b how cloud, social, mobile, big data and IoT are transforming physical security in the digital age /  |c Steve Van Till. 
264 1 |a Oxford, United Kingdom ;  |a Cambridge, MA, United States :  |b Butterworth-Heinemann is an imprint of Elsevier,  |c [2018] 
264 4 |c �2018 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Front Cover; The Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical S ... ; Copyright; Dedication; Contents; About the Author; Preface; Acknowledgments; Chapter 1: From Packages to People; The Consumerization of Security; Early Clouds, Sunny Skies; An IoT Story; From Premobile to Mobile First; Big Data in Its Infancy; Social Spaces; Dot-Com Redux in Physical Security; Technology Adoption in Physical Security; Section 1: The Cloud; Chapter 2: The Run-Up to Cloud; Cloud Meets an Industry of Late Adopters. 
505 8 |a Skating to Where the Puck Has BeenSaaS by Any Other Name; Marketers Run With It; Internet Protocol Blazes the Trail; Before We Called It ; Five Essential Characteristics and Why They Matter; Service Models: Applications vs Infrastructure; Deployment Models: Public Clouds vs Private Clouds; Chapter 3: The Tipping Point; The Drivers of Adoption; A Balanced View of Cyber Risks; Beyond Stack-a-Box; Are We More Conservative Than Our Customers?; A Foothold for Cloud; Leading Indicators; The Barriers Are Down; Easier for New Entrants; Start-Ups Show Up to the Game; The Innovator's Dilemma. 
505 8 |a DisruptionWhat Is My Cloud Strategy?; Section 2: Mobile; Chapter 4: Going Mobile; The Desk in Our Pockets; Mobile First; The Interactive Paradigm; The Toothbrush Test; Retention Matters; Adoption; Chapter 5: Security Ecosystems; The Desktop Reincarnated; Apps Have a Field Day; Mobile Credentials; Interactive Security; Middleware for the Real World; One Key to Rule Them All; ApplePay for Spaces; Don't We Get Any Standards Out of This?; Chapter 6: Altered Presence; Presence; Passive Surveillance; Known Knowns, Known Unknowns, and Unknown Unknowns; Anthrometrics: Web Metrics IRL. 
505 8 |a A Jewelry Case in PointBreathing the Data Exhaust; Chapter 7: What Can Mobile Do for Me?; What's in It for Me?; Real-Time Situational Awareness; Small Business; Multilocation Businesses; Property Management; What About Residential?; Biometrics & Multifactor Authentication; Transformation; What's My Mobile Strategy?; Mobile Starts With Cloud; Mobile Administration as a Workforce Multiplier; Mobile Credentials as an Engagement Accelerator; Leveraging Work-Life Integration; Section 3: The Internet of Things (IoT); Chapter 8: Why IoT Matters in Security; Security: Already an IoT Business. 
505 8 |a Ground ZeroWhat Is IoT, Anyway?; A Projection; It's All About the Data; Cheaper, Smaller, and More Discreet; Big Wave or The Biggest Wave?; IoT Will Become Part of Everything; The Industrial Internet of Things; Chapter 9: All Security Is Now Cybersecurity; Life Imitating Art; A Global, Residential, Commercial, and Even Universal Risk; Cloud Security ReduxBut Worse; Device Authentication: Do I Know You?; Orphans Without Governance; The Update Treadmill; A Path Forward; Chapter 10: IoT Technology and Standards; The Need for Standards; Architecture Matters; Building Blocks. 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed September 6, 2017). 
520 |a The Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age explores the major technological forces currently driving digital disruption in the security industry, and what they foretell for the future. The book provides a high-level perspective on how the industry is changing as a whole, as well as practical guidance on how to incorporate these new technologies to create better security solutions. It also examines key questions on how these new technologies have lowered barriers for new entrants in the field and how they are likely to change market dynamics and affect customer choices. Set in the context of one of the early dot.com companies to enter physical security, the narrative is written for professionals from Chief Security Officers and systems integrators to product managers and investors. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Cloud computing  |x Security measures. 
650 0 |a Online social networks  |x Security measures. 
650 0 |a Mobile computing  |x Security measures. 
650 0 |a Big data  |x Security measures. 
650 0 |a Internet of things  |x Security measures. 
650 2 |a Computer Security  |0 (DNLM)D016494 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 6 |a S�ecurit�e informatique.  |0 (CaQQLa)201-0061152 
650 6 |a Infonuagique  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)000300427 
650 6 |a R�eseaux sociaux (Internet)  |0 (CaQQLa)201-0500106  |x S�ecurit�e  |0 (CaQQLa)201-0373949  |x Mesures.  |0 (CaQQLa)201-0373949 
650 6 |a Informatique mobile  |0 (CaQQLa)201-0274402  |x S�ecurit�e  |0 (CaQQLa)201-0373949  |x Mesures.  |0 (CaQQLa)201-0373949 
650 6 |a Donn�ees volumineuses  |0 (CaQQLa)000284673  |x S�ecurit�e  |0 (CaQQLa)201-0373949  |x Mesures.  |0 (CaQQLa)201-0373949 
650 6 |a Internet des objets  |0 (CaQQLa)000269177  |x S�ecurit�e  |0 (CaQQLa)201-0373949  |x Mesures.  |0 (CaQQLa)201-0373949 
650 7 |a COMPUTERS  |x Security  |x Networking.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
776 0 8 |i Print version:  |a Till, Steve Van.  |t Five technological forces disrupting security.  |d Oxford, United Kingdom ; Cambridge, MA, United States : Butterworth-Heinemann is an imprint of Elsevier, [2018]  |z 0128050950  |z 9780128050958  |w (OCoLC)959885626 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780128050958  |z Texto completo