Enterprise level security 1 - 2 : advanced topics in an uncertain world (Record no. 32575)

000 -LEADER
fixed length control field a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230831b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780367536121
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number FOL
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Foltz, Kevin E.
245 ## - TITLE STATEMENT
Title Enterprise level security 1 - 2 : advanced topics in an uncertain world
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc CRC Press,
Date of publication, distribution, etc 2021
Place of publication, distribution, etc Boca Raton :
300 ## - PHYSICAL DESCRIPTION
Extent xxiii, 314 p. ;
Other physical details ill.,
Dimensions 24 cm
365 ## - TRADE PRICE
Price amount 42.99
Price type code GBP
Unit of pricing 110.40
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions, derived from 16 years of research, pilots, and operational trials in putting an enterprise system together. The chapters cover specific advanced topics derived from painful mistakes and numerous revisions of processes. This book covers many of the topics omitted from the first book including multi-factor authentication, cloud key management, enterprise change management, entity veracity, homomorphic computing, device management, mobile ad hoc, big data, mediation, and several other topics. The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. This is a unique approach to end-to-end security and fills a niche in the market.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks Security measures
Topical term or geographic name as entry element Industries Security measures
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Simpson, William Randolph
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Cost, normal purchase price Serial Enumeration / chronology Full call number Barcode Date last seen Koha item type
          DAIICT DAIICT 2023-08-26 4746.10 Volume 2 005.8 FOL 034110 2023-08-31 Books
          DAIICT DAIICT 2023-08-26 4746.10 Volume 1 005.8 FOL 034109 2023-08-31 Books

Powered by Koha