000 03576cam a2200265 i 4500
005 20251224140729.0
008 190609s2019 inu 001 0 eng
020 _a9781119617365
041 _aeng
082 0 4 _a005.8
_bQuaD
100 _a
245 0 4 _aThe Digital Big Bang :
_bThe Hard Stuff, the Soft Stuff, and the Future of Cybersecurity /
_cedited by Phil Quade
300 _axxviii, 306p.
505 0 _aSpeed : The Nucleus of the Cyberfrontier / Roland Cloutier, ADP -- Is Speed an Advantage? It Depends on the Context / Scott Charney, Microsoft -- Managing the Intensifying Connectivity of the IoT Era / Brian Talbert, Alaska Airlines -- Cyberspace : Making Some Sense of It All / Chris Inglis, Former NSA Deputy Director -- Authentication, Data Integrity, Nonrepudiation, Availability, and Confidentiality : The Five Pillars of Security / Mike McConnell, Former Director of National Intelligence -- Authentication and Models of Trust / Shannon Lietz, Intuit -- Patching : A Growing Challenge and a Needed Discipline / Chris Richter, Former VP of Global Security Services, CenturyLink -- Conquer or Be Conquered / Renee Tarun, Fortinet -- Fill the Skills Gap with an Environment of Continual Training / Chris McDaniels, CT Cubed, Inc. -- Employee Training is Key for Cybersecurity / Mo Katibeh, AT&T -- Training is a Mindset / Dave Rankin, Verisign -- Cryptography : The Backbone of Cybersecurity / Taher Elgamal, Salesforce -- Cryptography : The Good, the Bad, and the Future / Dan Boneh, Stanford -- Managing Access in Challenging Environments / Erik Devine, Riverside Health -- A Systematic Approach to Access Control / George Do, Equinix -- Successful Segmentation Isn't Separation : It's Collaboration / Colin Anderson, Levi Strauss & Co. -- Why We Need to Segment Networks / Hussein Syed, RWJBarnabas Health -- Visibility : Identifying Pathogens, Risk Factors, and Symptoms of Cyberattacks / Michael Chertoff, Former Secretary, Department of Homeland Security -- 20/20 Insight : Redefining Visibility to Stop Modern Cybercrime Syndicates / Tim Crothers, Target -- The Challenge of Visibility / Daniel Hooper, PIMCO -- In and Out of the Shadows : The Visibility That Inspection Enables is Not Confined to Technology Alone / Ed Amoroso, TAG Cyber -- The Fundamental Importance of Inspection / Michael Johnson, Capital One -- Preparation, Response, and Recovery / Thad Allen, Booz Allen Hamilton -- Cyber Event Recovery / Simon Lambe, Royal Mail -- Shift Your Mindset to Manage Complexity / Michael Daniel, Cyber Threat Alliance -- Seven Steps to Reducing Complexity / Jay Gonzales, Samsung -- Don't Panic! Security Pros Must Learn to Embrace the New Era of Privacy / Kevin Miller, MGM Resorts International -- Stricter Privacy Regulations Are Driving the Conversations--and Innovations--We Need / Peter Keenan, Global Financial Services Firm -- Overcoming Human Frailty : People and the Power of Obligation / Kevin Kealy, Ingram Micro -- Overcoming Human Frailty by Design / Theresa Payton, Fortalice -- Why Cybersecurity Needs AI / Michael Xie, Fortinet -- The Future of Cybersecurity / Ken Xie, Fortinet.
650 0 _aComputer security.
650 0 _aData encryption (Computer science)
650 0 _aInternet
_xSecurity measures
650 0 _aInformation technology
_xSecurity measures
_xManagement
650 0 _aData protection.
650 0 _aCyber intelligence (Computer security)
650 0 _aCyberterrorism
_xPrevention
700 1 _aQuade, Phil [Ed.]
856 _uhttps://ieeexplore.ieee.org/servlet/opac?bknumber=9820847
942 _cEBK
999 _c7886
_d7886