MARC details
| 000 -LEADER |
| fixed length control field |
02838nam a2200433Ii 4500 |
| 001 - CONTROL NUMBER |
| control field |
9781839099304 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
UtOrBLW |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20210303084742.0 |
| 006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
| fixed length control field |
m o d |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
| fixed length control field |
cr un||||||||| |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
200715s2020 enk ob 001 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781839099304 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
UtOrBLW |
| Language of cataloging |
eng |
| Description conventions |
rda |
| Transcribing agency |
UtOrBLW |
| 050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.9.A25 |
| Item number |
M67 2020 |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
COM053000 |
| Source |
bisacsh |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
URY |
| Source |
bicssc |
| 080 ## - UNIVERSAL DECIMAL CLASSIFICATION NUMBER |
| Universal Decimal Classification number |
004.62 |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
23 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Moriarty, Kathleen M., |
| Relator term |
author. |
| 245 10 - TITLE STATEMENT |
| Title |
Transforming information security : |
| Remainder of title |
optimizing five concurrent trends to reduce resource drain / |
| Statement of responsibility, etc. |
Kathleen M. Moriarty (Dell Technologies, USA). |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Name of producer, publisher, distributor, manufacturer |
Emerald Publishing Limited, |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
1 online resource (256 pages) ; |
| Dimensions |
cm |
| 500 ## - GENERAL NOTE |
| General note |
Includes index. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographical references. |
| 505 ## - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Chapter 1. Interconnected trends -- Chapter 2. Board level program evaluation and guidance -- Chapter 3. Architect a secure network with less -- Chapter 4. Encryption -- Chapter 5. Transport evolution: The encrypted stack -- Chapter 6. Authentication and authorization -- Chapter 7. The end point -- Chapter 8. Incident prevention, detection, and response -- Chapter 9. Looking forward. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable. In this exciting new book from security expert Kathleen M. Moriarty, the examination of all five trends uncovers opportunities to change the state of information security. Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space. |
| 588 0# - SOURCE OF DESCRIPTION NOTE |
| Source of description note |
Print version record. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Data protection. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Data encryption (Computer science) |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computers, Security |
| General subdivision |
General. |
| Source of heading or term |
bisacsh |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Data encryption. |
| Source of heading or term |
bicssc |
| 776 ## - ADDITIONAL PHYSICAL FORM ENTRY |
| International Standard Book Number |
9781839099298 |
| 856 40 - ELECTRONIC LOCATION AND ACCESS |
| Uniform Resource Identifier |
<a href="https://doi.org/10.1108/9781839099281">https://doi.org/10.1108/9781839099281</a> |