000 02838nam a2200433Ii 4500
001 9781839099304
003 UtOrBLW
005 20210303084742.0
006 m o d
007 cr un|||||||||
008 200715s2020 enk ob 001 0 eng d
020 _a9781839099304
040 _aUtOrBLW
_beng
_erda
_cUtOrBLW
050 4 _aQA76.9.A25
_bM67 2020
072 7 _aCOM053000
_2bisacsh
072 7 _aURY
_2bicssc
080 _a004.62
082 0 4 _a005.8
_223
100 1 _aMoriarty, Kathleen M.,
_eauthor.
245 1 0 _aTransforming information security :
_boptimizing five concurrent trends to reduce resource drain /
_cKathleen M. Moriarty (Dell Technologies, USA).
264 1 _bEmerald Publishing Limited,
300 _a1 online resource (256 pages) ;
_ccm
500 _aIncludes index.
504 _aIncludes bibliographical references.
505 _aChapter 1. Interconnected trends -- Chapter 2. Board level program evaluation and guidance -- Chapter 3. Architect a secure network with less -- Chapter 4. Encryption -- Chapter 5. Transport evolution: The encrypted stack -- Chapter 6. Authentication and authorization -- Chapter 7. The end point -- Chapter 8. Incident prevention, detection, and response -- Chapter 9. Looking forward.
520 _aThe information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable. In this exciting new book from security expert Kathleen M. Moriarty, the examination of all five trends uncovers opportunities to change the state of information security. Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space.
588 0 _aPrint version record.
650 0 _aComputer security.
650 0 _aData protection.
650 0 _aData encryption (Computer science)
650 7 _aComputers, Security
_xGeneral.
_2bisacsh
650 7 _aData encryption.
_2bicssc
776 _z9781839099298
856 4 0 _uhttps://doi.org/10.1108/9781839099281
999 _c29444
_d29444