Catholic University of Zimbabwe Library
Online Public Access Catalogue
(OPAC)

Transforming information security : (Record no. 29444)

MARC details
000 -LEADER
fixed length control field 02838nam a2200433Ii 4500
001 - CONTROL NUMBER
control field 9781839099304
003 - CONTROL NUMBER IDENTIFIER
control field UtOrBLW
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210303084742.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr un|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200715s2020 enk ob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781839099304
040 ## - CATALOGING SOURCE
Original cataloging agency UtOrBLW
Language of cataloging eng
Description conventions rda
Transcribing agency UtOrBLW
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number M67 2020
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source bicssc
080 ## - UNIVERSAL DECIMAL CLASSIFICATION NUMBER
Universal Decimal Classification number 004.62
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Moriarty, Kathleen M.,
Relator term author.
245 10 - TITLE STATEMENT
Title Transforming information security :
Remainder of title optimizing five concurrent trends to reduce resource drain /
Statement of responsibility, etc. Kathleen M. Moriarty (Dell Technologies, USA).
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Name of producer, publisher, distributor, manufacturer Emerald Publishing Limited,
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (256 pages) ;
Dimensions cm
500 ## - GENERAL NOTE
General note Includes index.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1. Interconnected trends -- Chapter 2. Board level program evaluation and guidance -- Chapter 3. Architect a secure network with less -- Chapter 4. Encryption -- Chapter 5. Transport evolution: The encrypted stack -- Chapter 6. Authentication and authorization -- Chapter 7. The end point -- Chapter 8. Incident prevention, detection, and response -- Chapter 9. Looking forward.
520 ## - SUMMARY, ETC.
Summary, etc. The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable. In this exciting new book from security expert Kathleen M. Moriarty, the examination of all five trends uncovers opportunities to change the state of information security. Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space.
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Print version record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption (Computer science)
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers, Security
General subdivision General.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption.
Source of heading or term bicssc
776 ## - ADDITIONAL PHYSICAL FORM ENTRY
International Standard Book Number 9781839099298
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1108/9781839099281">https://doi.org/10.1108/9781839099281</a>
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Date last seen Uniform Resource Identifier Price effective from Koha item type
          Digital Library Digital Library Online Access 03.03.2021   QA76.9.A25 M67 2020 03.03.2021 https://doi.org/10.1108/9781839099281 03.03.2021 eBook

OPENING HOURS

Weekdays: 0815hrs - 1800hrs
Weekends:0900hrs - 1200hrs

Closed for Mass:

Mon, Thur: 1200hrs - 1300hrs
Sunday & Public Holiday’s

CALL SUPPORT

0242-570570, 0242-570169
09200664, +263 8644140602

LOCATION

18443, Cranborne Avenue, Hatfield, Harare

Other Links


©2021 | CUZ Library