Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
The Second Economy = The Race for Tr...
~
SpringerLink (Online service)
The Second Economy = The Race for Trust, Treasure and Time in the Cybersecurity War /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
The Second Economy/ by Steve Grobman, Allison Cerra.
Reminder of title:
The Race for Trust, Treasure and Time in the Cybersecurity War /
Author:
Grobman, Steve.
other author:
Cerra, Allison.
Description:
XXXII, 238 p. 8 illus.online resource. :
Contained By:
Springer Nature eBook
Subject:
Computer communication systems. -
Online resource:
https://doi.org/10.1007/978-1-4842-2229-4
ISBN:
9781484222294
The Second Economy = The Race for Trust, Treasure and Time in the Cybersecurity War /
Grobman, Steve.
The Second Economy
The Race for Trust, Treasure and Time in the Cybersecurity War /[electronic resource] :by Steve Grobman, Allison Cerra. - 1st ed. 2016. - XXXII, 238 p. 8 illus.online resource.
Gain a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace to lead and thrive in an ever-shifting environment. In today’s hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, virtually every step we take, every transaction we initiate, and every interaction we have are supported in some way by this vast global infrastructure. This set of interconnected systems comprises the fundamental building blocks of the second economy – the very foundation of our first economy. And adversaries, whether motivated by profit, principle or province, are singularly focused on winning the race through a relentless portfolio of shifting attack vectors. Make no mistake about it, we are running a race. This is a race against a faceless, nameless adversary – one that dictates the starting line, the rules of the road, and what trophies are at stake. Established assumptions must be challenged, strategies must be revised, and long-held practices must be upended to run this race and effectively compete. The Second Economy highlights a second to none approach in this fight, as the effectiveness and ROI of security solutions are increasingly measured by the business outcomes they enable. What You Will Learn: Understand the value of time and trust in a cyber-warfare world Enable agile and intelligent organizations to minimize their risk of falling victim to the next attack Accelerate response time by adopting a holistic approach Eliminate friction across the threat defense lifecycle, from protection to detection to correction Gain a sustainable competitive advantage by seizing first mover advantage Deploy solutions across an open, integrated security framework Who This Book Is For: Senior-level IT decision makers concerned with ascribing business value to a robust security strategy. The book also addresses business decision makers who must be educated about the pervasive and growing cyber threatscape (including CXOs, board directors, and functional leaders) as well as general business employees to understand how they may become unwitting participants in a complex cyber war.
ISBN: 9781484222294
Standard No.: 10.1007/978-1-4842-2229-4doiSubjects--Topical Terms:
1115394
Computer communication systems.
LC Class. No.: TK5105.5-5105.9
Dewey Class. No.: 004.6
The Second Economy = The Race for Trust, Treasure and Time in the Cybersecurity War /
LDR
:03575nam a22003855i 4500
001
977297
003
DE-He213
005
20200702202157.0
007
cr nn 008mamaa
008
201211s2016 xxu| s |||| 0|eng d
020
$a
9781484222294
$9
978-1-4842-2229-4
024
7
$a
10.1007/978-1-4842-2229-4
$2
doi
035
$a
978-1-4842-2229-4
050
4
$a
TK5105.5-5105.9
072
7
$a
UKN
$2
bicssc
072
7
$a
COM075000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
004.6
$2
23
100
1
$a
Grobman, Steve.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1115039
245
1 4
$a
The Second Economy
$h
[electronic resource] :
$b
The Race for Trust, Treasure and Time in the Cybersecurity War /
$c
by Steve Grobman, Allison Cerra.
250
$a
1st ed. 2016.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2016.
300
$a
XXXII, 238 p. 8 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
520
$a
Gain a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace to lead and thrive in an ever-shifting environment. In today’s hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, virtually every step we take, every transaction we initiate, and every interaction we have are supported in some way by this vast global infrastructure. This set of interconnected systems comprises the fundamental building blocks of the second economy – the very foundation of our first economy. And adversaries, whether motivated by profit, principle or province, are singularly focused on winning the race through a relentless portfolio of shifting attack vectors. Make no mistake about it, we are running a race. This is a race against a faceless, nameless adversary – one that dictates the starting line, the rules of the road, and what trophies are at stake. Established assumptions must be challenged, strategies must be revised, and long-held practices must be upended to run this race and effectively compete. The Second Economy highlights a second to none approach in this fight, as the effectiveness and ROI of security solutions are increasingly measured by the business outcomes they enable. What You Will Learn: Understand the value of time and trust in a cyber-warfare world Enable agile and intelligent organizations to minimize their risk of falling victim to the next attack Accelerate response time by adopting a holistic approach Eliminate friction across the threat defense lifecycle, from protection to detection to correction Gain a sustainable competitive advantage by seizing first mover advantage Deploy solutions across an open, integrated security framework Who This Book Is For: Senior-level IT decision makers concerned with ascribing business value to a robust security strategy. The book also addresses business decision makers who must be educated about the pervasive and growing cyber threatscape (including CXOs, board directors, and functional leaders) as well as general business employees to understand how they may become unwitting participants in a complex cyber war.
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Computer security.
$3
557122
650
1 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Systems and Data Security.
$3
677062
700
1
$a
Cerra, Allison.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1115040
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484222287
776
0 8
$i
Printed edition:
$z
9781484222300
776
0 8
$i
Printed edition:
$z
9781484226124
856
4 0
$u
https://doi.org/10.1007/978-1-4842-2229-4
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login