Five technological forces disrupting security : how cloud, social, mobile, big data and IoT are transforming physical security in the digital age /
The Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age explores the major technological forces currently driving digital disruption in the security industry, and what they foretell for the future. The book...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Oxford, United Kingdom ; Cambridge, MA, United States :
Butterworth-Heinemann is an imprint of Elsevier,
[2018]
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Front Cover; The Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical S ... ; Copyright; Dedication; Contents; About the Author; Preface; Acknowledgments; Chapter 1: From Packages to People; The Consumerization of Security; Early Clouds, Sunny Skies; An IoT Story; From Premobile to Mobile First; Big Data in Its Infancy; Social Spaces; Dot-Com Redux in Physical Security; Technology Adoption in Physical Security; Section 1: The Cloud; Chapter 2: The Run-Up to Cloud; Cloud Meets an Industry of Late Adopters.
- Skating to Where the Puck Has BeenSaaS by Any Other Name; Marketers Run With It; Internet Protocol Blazes the Trail; Before We Called It ; Five Essential Characteristics and Why They Matter; Service Models: Applications vs Infrastructure; Deployment Models: Public Clouds vs Private Clouds; Chapter 3: The Tipping Point; The Drivers of Adoption; A Balanced View of Cyber Risks; Beyond Stack-a-Box; Are We More Conservative Than Our Customers?; A Foothold for Cloud; Leading Indicators; The Barriers Are Down; Easier for New Entrants; Start-Ups Show Up to the Game; The Innovator's Dilemma.
- DisruptionWhat Is My Cloud Strategy?; Section 2: Mobile; Chapter 4: Going Mobile; The Desk in Our Pockets; Mobile First; The Interactive Paradigm; The Toothbrush Test; Retention Matters; Adoption; Chapter 5: Security Ecosystems; The Desktop Reincarnated; Apps Have a Field Day; Mobile Credentials; Interactive Security; Middleware for the Real World; One Key to Rule Them All; ApplePay for Spaces; Don't We Get Any Standards Out of This?; Chapter 6: Altered Presence; Presence; Passive Surveillance; Known Knowns, Known Unknowns, and Unknown Unknowns; Anthrometrics: Web Metrics IRL.
- A Jewelry Case in PointBreathing the Data Exhaust; Chapter 7: What Can Mobile Do for Me?; What's in It for Me?; Real-Time Situational Awareness; Small Business; Multilocation Businesses; Property Management; What About Residential?; Biometrics & Multifactor Authentication; Transformation; What's My Mobile Strategy?; Mobile Starts With Cloud; Mobile Administration as a Workforce Multiplier; Mobile Credentials as an Engagement Accelerator; Leveraging Work-Life Integration; Section 3: The Internet of Things (IoT); Chapter 8: Why IoT Matters in Security; Security: Already an IoT Business.
- Ground ZeroWhat Is IoT, Anyway?; A Projection; It's All About the Data; Cheaper, Smaller, and More Discreet; Big Wave or The Biggest Wave?; IoT Will Become Part of Everything; The Industrial Internet of Things; Chapter 9: All Security Is Now Cybersecurity; Life Imitating Art; A Global, Residential, Commercial, and Even Universal Risk; Cloud Security ReduxBut Worse; Device Authentication: Do I Know You?; Orphans Without Governance; The Update Treadmill; A Path Forward; Chapter 10: IoT Technology and Standards; The Need for Standards; Architecture Matters; Building Blocks.