000 -LEADER |
fixed length control field |
a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
230831b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780367536121 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
FOL |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Foltz, Kevin E. |
245 ## - TITLE STATEMENT |
Title |
Enterprise level security 1 - 2 : advanced topics in an uncertain world |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Name of publisher, distributor, etc |
CRC Press, |
Date of publication, distribution, etc |
2021 |
Place of publication, distribution, etc |
Boca Raton : |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxiii, 314 p. ; |
Other physical details |
ill., |
Dimensions |
24 cm |
365 ## - TRADE PRICE |
Price amount |
42.99 |
Price type code |
GBP |
Unit of pricing |
110.40 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions, derived from 16 years of research, pilots, and operational trials in putting an enterprise system together. The chapters cover specific advanced topics derived from painful mistakes and numerous revisions of processes. This book covers many of the topics omitted from the first book including multi-factor authentication, cloud key management, enterprise change management, entity veracity, homomorphic computing, device management, mobile ad hoc, big data, mediation, and several other topics. The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. This is a unique approach to end-to-end security and fills a niche in the market. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks Security measures |
|
Topical term or geographic name as entry element |
Industries Security measures |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Simpson, William Randolph |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Books |