Transforming information security : optimizing five concurrent trends to reduce resource drain
Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space.
Saved in:
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
Bingley, UK :
Emerald Publishing Limited,
[2020]
|
Subjects: | |
ISBN: | 9781839099281 9781839099304 9781839099311 |
Physical Description: | 1 online zdroj |
LEADER | 02448cam a2200421 i 4500 | ||
---|---|---|---|
001 | 110514 | ||
003 | CZ-ZlUTB | ||
005 | 20240914115136.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 200629s2020 xx o 0|| 0 eng d | ||
040 | |a YDX |b eng |e rda |c YDX |d EBLCP |d UKAHL |d UKMGB |d OCLCF |d OCLCO |d SFB |d N$T |d OCLCO |d K6U |d OCLCQ |d OCLCO |d OCLCL | ||
020 | |a 9781839099281 |q (PDF ebook) | ||
020 | |a 9781839099304 |q (electronic bk.) | ||
020 | |z 9781839099311 | ||
035 | |a (OCoLC)1160094116 |z (OCoLC)1163475139 | ||
100 | 1 | |a Moriarty, Kathleen M., |e author. | |
245 | 1 | 0 | |a Transforming information security : |b optimizing five concurrent trends to reduce resource drain / |c Kathleen M. Moriarty (Dell Technologies, USA). |
264 | 1 | |a Bingley, UK : |b Emerald Publishing Limited, |c [2020] | |
264 | 4 | |c ©2020 | |
300 | |a 1 online zdroj | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a počítač |b c |2 rdamedia | ||
338 | |a online zdroj |b cr |2 rdacarrier | ||
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space. | ||
505 | 0 | |a Chapter 1. Interconnected trends -- Chapter 2. Board level program evaluation and guidance -- Chapter 3. Architect a secure network with less -- Chapter 4. Encryption -- Chapter 5. Transport evolution: The encrypted stack -- Chapter 6. Authentication and authorization -- Chapter 7. The end point -- Chapter 8. Incident prevention, detection, and response -- Chapter 9. Looking forward. | |
590 | |a eBooks on EBSCOhost |b All EBSCO eBooks | ||
650 | 0 | |a Information networks |x Security measures. | |
650 | 0 | |a Information technology |x Management. | |
650 | 0 | |a Information resources management. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
776 | 0 | 8 | |i Print version: |z 1839099313 |z 9781839099311 |w (OCoLC)1153005593 |
856 | 4 | 0 | |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2409838&authtype=ip,shib&custid=s3936755 |y Plný text |
992 | |c EBOOK-TN |c EBSCO | ||
999 | |c 110514 |d 110514 | ||
993 | |x NEPOSILAT |y EIZ |