The Digital Big Bang : (Record no. 7886)

MARC details
000 -LEADER
fixed length control field 03576cam a2200265 i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20251224140729.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190609s2019 inu 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119617365
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number QuaD
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name
245 04 - TITLE STATEMENT
Title The Digital Big Bang :
Remainder of title The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity /
Statement of responsibility, etc edited by Phil Quade
300 ## - PHYSICAL DESCRIPTION
Number of Pages xxviii, 306p.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Speed : The Nucleus of the Cyberfrontier / Roland Cloutier, ADP -- Is Speed an Advantage? It Depends on the Context / Scott Charney, Microsoft -- Managing the Intensifying Connectivity of the IoT Era / Brian Talbert, Alaska Airlines -- Cyberspace : Making Some Sense of It All / Chris Inglis, Former NSA Deputy Director -- Authentication, Data Integrity, Nonrepudiation, Availability, and Confidentiality : The Five Pillars of Security / Mike McConnell, Former Director of National Intelligence -- Authentication and Models of Trust / Shannon Lietz, Intuit -- Patching : A Growing Challenge and a Needed Discipline / Chris Richter, Former VP of Global Security Services, CenturyLink -- Conquer or Be Conquered / Renee Tarun, Fortinet -- Fill the Skills Gap with an Environment of Continual Training / Chris McDaniels, CT Cubed, Inc. -- Employee Training is Key for Cybersecurity / Mo Katibeh, AT&T -- Training is a Mindset / Dave Rankin, Verisign -- Cryptography : The Backbone of Cybersecurity / Taher Elgamal, Salesforce -- Cryptography : The Good, the Bad, and the Future / Dan Boneh, Stanford -- Managing Access in Challenging Environments / Erik Devine, Riverside Health -- A Systematic Approach to Access Control / George Do, Equinix -- Successful Segmentation Isn't Separation : It's Collaboration / Colin Anderson, Levi Strauss & Co. -- Why We Need to Segment Networks / Hussein Syed, RWJBarnabas Health -- Visibility : Identifying Pathogens, Risk Factors, and Symptoms of Cyberattacks / Michael Chertoff, Former Secretary, Department of Homeland Security -- 20/20 Insight : Redefining Visibility to Stop Modern Cybercrime Syndicates / Tim Crothers, Target -- The Challenge of Visibility / Daniel Hooper, PIMCO -- In and Out of the Shadows : The Visibility That Inspection Enables is Not Confined to Technology Alone / Ed Amoroso, TAG Cyber -- The Fundamental Importance of Inspection / Michael Johnson, Capital One -- Preparation, Response, and Recovery / Thad Allen, Booz Allen Hamilton -- Cyber Event Recovery / Simon Lambe, Royal Mail -- Shift Your Mindset to Manage Complexity / Michael Daniel, Cyber Threat Alliance -- Seven Steps to Reducing Complexity / Jay Gonzales, Samsung -- Don't Panic! Security Pros Must Learn to Embrace the New Era of Privacy / Kevin Miller, MGM Resorts International -- Stricter Privacy Regulations Are Driving the Conversations--and Innovations--We Need / Peter Keenan, Global Financial Services Firm -- Overcoming Human Frailty : People and the Power of Obligation / Kevin Kealy, Ingram Micro -- Overcoming Human Frailty by Design / Theresa Payton, Fortalice -- Why Cybersecurity Needs AI / Michael Xie, Fortinet -- The Future of Cybersecurity / Ken Xie, Fortinet.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Data encryption (Computer science)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Internet
General subdivision Security measures
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Information technology
General subdivision Security measures
-- Management
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Cyber intelligence (Computer security)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Cyberterrorism
General subdivision Prevention
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Quade, Phil [Ed.]
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=9820847
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-Books
Holdings
Withdrawn status Lost status Damaged status Home library Current library Date acquired Full call number Accession Number Bill Date/Price effective from Koha item type
      Indian Institute of Technology Tirupati Indian Institute of Technology Tirupati 24/12/2025 005.8 QuaD EB00817 24/12/2025 E-Books