語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
The second economy = the race for tr...
~
Grobman, Steve.
FindBook
Google Book
Amazon
博客來
The second economy = the race for trust, treasure and time in the cybersecurity war /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
The second economy/ by Steve Grobman, Allison Cerra.
其他題名:
the race for trust, treasure and time in the cybersecurity war /
作者:
Grobman, Steve.
其他作者:
Cerra, Allison.
出版者:
Berkeley, CA :Apress : : 2016.,
面頁冊數:
xxviii, 200 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Computer networks - Security measures. -
電子資源:
http://dx.doi.org/10.1007/978-1-4842-2229-4
ISBN:
9781484222294
The second economy = the race for trust, treasure and time in the cybersecurity war /
Grobman, Steve.
The second economy
the race for trust, treasure and time in the cybersecurity war /[electronic resource] :by Steve Grobman, Allison Cerra. - Berkeley, CA :Apress :2016. - xxviii, 200 p. :ill., digital ;24 cm.
In today's hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, virtually every step we take, every transaction we initiate, and every interaction we have are supported in some way by this vast global infrastructure. This set of interconnected systems comprises the fundamental building blocks of the second economy - the very foundation of our first economy. And adversaries, whether motivated by profit, principle or province, are singularly focused on winning the race through a relentless portfolio of shifting attack vectors. The complexity and volume of these attacks are seemingly unstoppable. And, while the significant financial risk for compromised organizations is very real, the larger and more insidious threat rests with the erosion of the hard-earned trust of customers and other stakeholders. A foundational element of the actual economy, trust, once lost, is not easily recaptured. When it is shaken through a breach, seconds matter. To successfully compete against more sophisticated adversaries and protect their organizations, IT security professionals must take a second look at established security notions and challenge their thinking. Being second to none in this fight is essential, as the effectiveness and ROI of security solutions are increasingly measured by the business outcomes they enable. Offering a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace, The Second Economy is a must read for those who endeavor to lead and thrive in an ever-shifting environment. Make no mistake about it, we are running a race. This is a race against a faceless, nameless adversary - one that dictates the starting line, the rules of the road, and what trophies are at stake. Established assumptions must be challenged, strategies must be revised, and long-held practices must be upended to run this race and effectively compete in The Second Economy. What You Will Learn: Understand the value of time and trust in a cyber-warfare world, enabling agile and intelligent organizations to minimize their risk of falling victim to the next attack How to accelerate response time by adopting a holistic approach that eliminates friction across the threat defense lifecycle, from protection to detection to correction How to gain sustainable competitive advantage by seizing first mover advantage in deploying solutions across an open, integrated security framework Who This Book Is For: Senior-level IT decision makers concerned with ascribing business value to a robust security strategy. The book also addresses business decision makers who must be educated about the pervasive and growing cyber threatscape (including CXOs, board directors, and functional leaders) as well as general business employees to understand how they may become unwitting participants in a complex cyber war.
ISBN: 9781484222294
Standard No.: 10.1007/978-1-4842-2229-4doiSubjects--Topical Terms:
579161
Computer networks
--Security measures.
LC Class. No.: QA76.9.A25 / G76 2016
Dewey Class. No.: 005.8
The second economy = the race for trust, treasure and time in the cybersecurity war /
LDR
:03911nmm a2200301 a 4500
001
2053873
003
DE-He213
005
20161008142107.0
006
m d
007
cr nn 008maaau
008
170510s2016 cau s 0 eng d
020
$a
9781484222294
$q
(electronic bk.)
020
$a
9781484222287
$q
(paper)
024
7
$a
10.1007/978-1-4842-2229-4
$2
doi
035
$a
978-1-4842-2229-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
G76 2016
072
7
$a
UKN
$2
bicssc
072
7
$a
COM075000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
G873 2016
100
1
$a
Grobman, Steve.
$3
560187
245
1 4
$a
The second economy
$h
[electronic resource] :
$b
the race for trust, treasure and time in the cybersecurity war /
$c
by Steve Grobman, Allison Cerra.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2016.
300
$a
xxviii, 200 p. :
$b
ill., digital ;
$c
24 cm.
520
$a
In today's hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, virtually every step we take, every transaction we initiate, and every interaction we have are supported in some way by this vast global infrastructure. This set of interconnected systems comprises the fundamental building blocks of the second economy - the very foundation of our first economy. And adversaries, whether motivated by profit, principle or province, are singularly focused on winning the race through a relentless portfolio of shifting attack vectors. The complexity and volume of these attacks are seemingly unstoppable. And, while the significant financial risk for compromised organizations is very real, the larger and more insidious threat rests with the erosion of the hard-earned trust of customers and other stakeholders. A foundational element of the actual economy, trust, once lost, is not easily recaptured. When it is shaken through a breach, seconds matter. To successfully compete against more sophisticated adversaries and protect their organizations, IT security professionals must take a second look at established security notions and challenge their thinking. Being second to none in this fight is essential, as the effectiveness and ROI of security solutions are increasingly measured by the business outcomes they enable. Offering a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace, The Second Economy is a must read for those who endeavor to lead and thrive in an ever-shifting environment. Make no mistake about it, we are running a race. This is a race against a faceless, nameless adversary - one that dictates the starting line, the rules of the road, and what trophies are at stake. Established assumptions must be challenged, strategies must be revised, and long-held practices must be upended to run this race and effectively compete in The Second Economy. What You Will Learn: Understand the value of time and trust in a cyber-warfare world, enabling agile and intelligent organizations to minimize their risk of falling victim to the next attack How to accelerate response time by adopting a holistic approach that eliminates friction across the threat defense lifecycle, from protection to detection to correction How to gain sustainable competitive advantage by seizing first mover advantage in deploying solutions across an open, integrated security framework Who This Book Is For: Senior-level IT decision makers concerned with ascribing business value to a robust security strategy. The book also addresses business decision makers who must be educated about the pervasive and growing cyber threatscape (including CXOs, board directors, and functional leaders) as well as general business employees to understand how they may become unwitting participants in a complex cyber war.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Computer security.
$3
540555
650
0
$a
Internet
$x
Security measures.
$3
590477
650
1 4
$a
Computer Science.
$3
626642
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Systems and Data Security.
$3
898223
700
1
$a
Cerra, Allison.
$3
3167054
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
856
4 0
$u
http://dx.doi.org/10.1007/978-1-4842-2229-4
950
$a
Professional and Applied Computing (Springer-12059)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9287176
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 G76 2016
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入