Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Transforming Information Security - Kathleen M. Moriarty

Transforming Information Security

Optimizing Five Concurrent Trends to Reduce Resource Drain
Buch | Softcover
240 Seiten
2020
Emerald Publishing Limited (Verlag)
978-1-83909-931-1 (ISBN)
CHF 79,95 inkl. MwSt
Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today’s problems to providing solutions for the future of our product space.
The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable.


In this exciting new book from security expert Kathleen M. Moriarty, the examination of all five trends uncovers opportunities to change the state of information security. Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space.

Kathleen Moriarty, Chief Technology Officer at the Center for Internet Security, has over two decades of experience. Named in CyberSecurity Venture’s, “Top 100 Women Fighting Cybercrime”, Kathleen served two recent terms as Internet Engineering Task Force (IETF) Security Area Director and member of the Internet Engineering Steering Group (IESG) from March 2014-2018, during her tenure in the Office of the CTO. She is a 2020 Tropaia Award Winner, Outstanding Faculty, Georgetown SCS.

Chapter 1. Interconnected TrendsChapter 2. Board Level Program Evaluation and Guidance
Chapter 3. Architect a Secure Network with Less
Chapter 4. Encryption
Chapter 5. Transport Evolution: The Encrypted Stack
Chapter 6. Authentication and Authorization
Chapter 7. The End Point
Chapter 8. Incident Prevention, Detection, and Response
Chapter 9. Looking Forward

Erscheinungsdatum
Verlagsort Bingley
Sprache englisch
Maße 129 x 198 mm
Gewicht 256 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 1-83909-931-3 / 1839099313
ISBN-13 978-1-83909-931-1 / 9781839099311
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 48,95
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
CHF 39,20