Transforming information security : optimizing five concurrent trends to reduce resource drain

The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between thes...

Full description

Saved in:
Bibliographic Details
Main Author: Moriarty, Kathleen M. (Author)
Corporate Author: Emerald Insight (online služba) (Distributor) 
Format: eBook
Language:English
Published: Bingley, UK : Emerald Publishing Limited, 2020
Genre/form:monografie
elektronické knihy
ISBN:978-1-83909-930-4
978-1-83909-928-1
978-1-83909-931-1
Subjects:
Online Access:Plný text
Tags: Add Tag
No Tags, Be the first to tag this record!
Cover Image
LEADER 03200cam a22004817i 4500
001 001808430
003 CZ PrSTK
005 20210810104615.0
006 m f d
007 cr nn 008mamaa
008 200715s2020 xxka b 001 0 eng d
020 |a 978-1-83909-930-4  |q (formát EPUB) 
020 |a 978-1-83909-928-1  |q (elektronická kniha) 
020 |z 978-1-83909-931-1  |q (brožováno) 
040 |a UtOrBLW  |b cze  |c UtOrBLW  |d ABA013  |e rda 
050 4 |a QA76.9.A25 
072 7 |a 004  |x Počítačová věda. Výpočetní technika. Informační technologie  |2 Konspekt  |9 23 
080 |a 004.6.056.5  |2 MRF 
080 |a 004.056.55  |2 MRF 
080 |a 351.759:[001.102+004]  |2 MRF 
080 |a (048.8)  |2 MRF 
080 |a (0.034.2:08)  |2 MRF 
100 1 |a Moriarty, Kathleen M.  |4 aut 
245 1 0 |a Transforming information security :  |b optimizing five concurrent trends to reduce resource drain /  |c Kathleen M. Moriarty 
250 |a First published 
264 1 |a Bingley, UK :  |b Emerald Publishing Limited,  |c 2020 
300 |a 1 online zdroj (xii, 224 stran) :  |b ilustrace 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
504 |a Obsahuje bibliografii a rejstřík 
505 0 |a Chapter 1. Interconnected trends -- Chapter 2. Board level program evaluation and guidance -- Chapter 3. Architect a secure network with less -- Chapter 4. Encryption -- Chapter 5. Transport evolution: The encrypted stack -- Chapter 6. Authentication and authorization -- Chapter 7. The end point -- Chapter 8. Incident prevention, detection, and response -- Chapter 9. Looking forward 
520 |a The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable. In this exciting new book from security expert Kathleen M. Moriarty, the examination of all five trends uncovers opportunities to change the state of information security. Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space. 
650 0 7 |a zabezpečení dat  |x vt  |7 psh12464  |2 psh 
650 0 7 |a ochrana dat  |x vt  |7 psh12544  |2 psh 
650 0 7 |a šifrování dat  |x vt  |7 psh12353  |2 psh 
650 0 7 |a informační bezpečnost  |7 ph136652  |2 czenas 
655 7 |a monografie  |7 fd132842  |2 czenas 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
710 2 |a Emerald Insight (online služba)  |7 ntk20211111362  |4 dst 
856 4 0 |u https://doi.org/10.1108/9781839099281  |y Plný text 
910 |a ABA013 
950 |a Emerald  |b EBA 2020