| 000 | 03576cam a2200265 i 4500 | ||
|---|---|---|---|
| 005 | 20251224140729.0 | ||
| 008 | 190609s2019 inu 001 0 eng | ||
| 020 | _a9781119617365 | ||
| 041 | _aeng | ||
| 082 | 0 | 4 |
_a005.8 _bQuaD |
| 100 | _a | ||
| 245 | 0 | 4 |
_aThe Digital Big Bang : _bThe Hard Stuff, the Soft Stuff, and the Future of Cybersecurity / _cedited by Phil Quade |
| 300 | _axxviii, 306p. | ||
| 505 | 0 | _aSpeed : The Nucleus of the Cyberfrontier / Roland Cloutier, ADP -- Is Speed an Advantage? It Depends on the Context / Scott Charney, Microsoft -- Managing the Intensifying Connectivity of the IoT Era / Brian Talbert, Alaska Airlines -- Cyberspace : Making Some Sense of It All / Chris Inglis, Former NSA Deputy Director -- Authentication, Data Integrity, Nonrepudiation, Availability, and Confidentiality : The Five Pillars of Security / Mike McConnell, Former Director of National Intelligence -- Authentication and Models of Trust / Shannon Lietz, Intuit -- Patching : A Growing Challenge and a Needed Discipline / Chris Richter, Former VP of Global Security Services, CenturyLink -- Conquer or Be Conquered / Renee Tarun, Fortinet -- Fill the Skills Gap with an Environment of Continual Training / Chris McDaniels, CT Cubed, Inc. -- Employee Training is Key for Cybersecurity / Mo Katibeh, AT&T -- Training is a Mindset / Dave Rankin, Verisign -- Cryptography : The Backbone of Cybersecurity / Taher Elgamal, Salesforce -- Cryptography : The Good, the Bad, and the Future / Dan Boneh, Stanford -- Managing Access in Challenging Environments / Erik Devine, Riverside Health -- A Systematic Approach to Access Control / George Do, Equinix -- Successful Segmentation Isn't Separation : It's Collaboration / Colin Anderson, Levi Strauss & Co. -- Why We Need to Segment Networks / Hussein Syed, RWJBarnabas Health -- Visibility : Identifying Pathogens, Risk Factors, and Symptoms of Cyberattacks / Michael Chertoff, Former Secretary, Department of Homeland Security -- 20/20 Insight : Redefining Visibility to Stop Modern Cybercrime Syndicates / Tim Crothers, Target -- The Challenge of Visibility / Daniel Hooper, PIMCO -- In and Out of the Shadows : The Visibility That Inspection Enables is Not Confined to Technology Alone / Ed Amoroso, TAG Cyber -- The Fundamental Importance of Inspection / Michael Johnson, Capital One -- Preparation, Response, and Recovery / Thad Allen, Booz Allen Hamilton -- Cyber Event Recovery / Simon Lambe, Royal Mail -- Shift Your Mindset to Manage Complexity / Michael Daniel, Cyber Threat Alliance -- Seven Steps to Reducing Complexity / Jay Gonzales, Samsung -- Don't Panic! Security Pros Must Learn to Embrace the New Era of Privacy / Kevin Miller, MGM Resorts International -- Stricter Privacy Regulations Are Driving the Conversations--and Innovations--We Need / Peter Keenan, Global Financial Services Firm -- Overcoming Human Frailty : People and the Power of Obligation / Kevin Kealy, Ingram Micro -- Overcoming Human Frailty by Design / Theresa Payton, Fortalice -- Why Cybersecurity Needs AI / Michael Xie, Fortinet -- The Future of Cybersecurity / Ken Xie, Fortinet. | |
| 650 | 0 | _aComputer security. | |
| 650 | 0 | _aData encryption (Computer science) | |
| 650 | 0 |
_aInternet _xSecurity measures |
|
| 650 | 0 |
_aInformation technology _xSecurity measures _xManagement |
|
| 650 | 0 | _aData protection. | |
| 650 | 0 | _aCyber intelligence (Computer security) | |
| 650 | 0 |
_aCyberterrorism _xPrevention |
|
| 700 | 1 | _aQuade, Phil [Ed.] | |
| 856 | _uhttps://ieeexplore.ieee.org/servlet/opac?bknumber=9820847 | ||
| 942 | _cEBK | ||
| 999 |
_c7886 _d7886 |
||