Transforming information security : optimizing five concurrent trends to reduce resource drain

Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space.

Saved in:
Bibliographic Details
Main Author: Moriarty, Kathleen M., (Author)
Format: eBook
Language: English
Published: Bingley, UK : Emerald Publishing Limited, [2020]
Subjects:
ISBN: 9781839099281
9781839099304
9781839099311
Physical Description: 1 online zdroj

Cover

Table of contents

LEADER 02417cam a2200409 i 4500
001 110514
003 CZ-ZlUTB
005 20240321145642.0
006 m o d
007 cr |n|||||||||
008 200629s2020 xx o 0|| 0 eng d
040 |a YDX  |b eng  |e rda  |c YDX  |d EBLCP  |d UKAHL  |d UKMGB  |d OCLCF  |d OCLCO  |d SFB  |d N$T  |d OCLCO  |d K6U  |d OCLCQ  |d OCLCO  |d OCLCL 
020 |a 9781839099281  |q (PDF ebook) 
020 |a 9781839099304  |q (electronic bk.) 
020 |z 9781839099311 
035 |a (OCoLC)1160094116  |z (OCoLC)1163475139 
100 1 |a Moriarty, Kathleen M.,  |e author. 
245 1 0 |a Transforming information security :  |b optimizing five concurrent trends to reduce resource drain /  |c Kathleen M. Moriarty (Dell Technologies, USA). 
264 1 |a Bingley, UK :  |b Emerald Publishing Limited,  |c [2020] 
264 4 |c ©2020 
300 |a 1 online zdroj 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space. 
505 0 |a Chapter 1. Interconnected trends -- Chapter 2. Board level program evaluation and guidance -- Chapter 3. Architect a secure network with less -- Chapter 4. Encryption -- Chapter 5. Transport evolution: The encrypted stack -- Chapter 6. Authentication and authorization -- Chapter 7. The end point -- Chapter 8. Incident prevention, detection, and response -- Chapter 9. Looking forward. 
590 |a eBooks on EBSCOhost  |b All EBSCO eBooks 
650 0 |a Information networks  |x Security measures. 
650 0 |a Information technology  |x Management. 
650 0 |a Information resources management. 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 9 |a electronic books  |2 eczenas 
776 0 8 |i Print version:  |z 1839099313  |z 9781839099311  |w (OCoLC)1153005593 
856 4 0 |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2409838&authtype=ip,shib&custid=s3936755  |y Plný text 
992 |c EBOOK-TN  |c EBSCO 
999 |c 110514  |d 110514