Transforming information security : optimizing five concurrent trends to reduce resource drain
The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between thes...
Saved in:
Main Author: | |
---|---|
Corporate Author: | |
Format: | eBook |
Language: | English |
Published: |
Bingley, UK :
Emerald Publishing Limited,
2020
|
Genre/form: | monografie elektronické knihy |
ISBN: | 978-1-83909-930-4 978-1-83909-928-1 978-1-83909-931-1 |
Subjects: | |
Online Access: | Plný text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 03200cam a22004817i 4500 | ||
---|---|---|---|
001 | 001808430 | ||
003 | CZ PrSTK | ||
005 | 20210810104615.0 | ||
006 | m f d | ||
007 | cr nn 008mamaa | ||
008 | 200715s2020 xxka b 001 0 eng d | ||
020 | |a 978-1-83909-930-4 |q (formát EPUB) | ||
020 | |a 978-1-83909-928-1 |q (elektronická kniha) | ||
020 | |z 978-1-83909-931-1 |q (brožováno) | ||
040 | |a UtOrBLW |b cze |c UtOrBLW |d ABA013 |e rda | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a 004 |x Počítačová věda. Výpočetní technika. Informační technologie |2 Konspekt |9 23 | |
080 | |a 004.6.056.5 |2 MRF | ||
080 | |a 004.056.55 |2 MRF | ||
080 | |a 351.759:[001.102+004] |2 MRF | ||
080 | |a (048.8) |2 MRF | ||
080 | |a (0.034.2:08) |2 MRF | ||
100 | 1 | |a Moriarty, Kathleen M. |4 aut | |
245 | 1 | 0 | |a Transforming information security : |b optimizing five concurrent trends to reduce resource drain / |c Kathleen M. Moriarty |
250 | |a First published | ||
264 | 1 | |a Bingley, UK : |b Emerald Publishing Limited, |c 2020 | |
300 | |a 1 online zdroj (xii, 224 stran) : |b ilustrace | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a počítač |b c |2 rdamedia | ||
338 | |a online zdroj |b cr |2 rdacarrier | ||
504 | |a Obsahuje bibliografii a rejstřík | ||
505 | 0 | |a Chapter 1. Interconnected trends -- Chapter 2. Board level program evaluation and guidance -- Chapter 3. Architect a secure network with less -- Chapter 4. Encryption -- Chapter 5. Transport evolution: The encrypted stack -- Chapter 6. Authentication and authorization -- Chapter 7. The end point -- Chapter 8. Incident prevention, detection, and response -- Chapter 9. Looking forward | |
520 | |a The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable. In this exciting new book from security expert Kathleen M. Moriarty, the examination of all five trends uncovers opportunities to change the state of information security. Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space. | ||
650 | 0 | 7 | |a zabezpečení dat |x vt |7 psh12464 |2 psh |
650 | 0 | 7 | |a ochrana dat |x vt |7 psh12544 |2 psh |
650 | 0 | 7 | |a šifrování dat |x vt |7 psh12353 |2 psh |
650 | 0 | 7 | |a informační bezpečnost |7 ph136652 |2 czenas |
655 | 7 | |a monografie |7 fd132842 |2 czenas | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
710 | 2 | |a Emerald Insight (online služba) |7 ntk20211111362 |4 dst | |
856 | 4 | 0 | |u https://doi.org/10.1108/9781839099281 |y Plný text |
910 | |a ABA013 | ||
950 | |a Emerald |b EBA 2020 |