Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World - Kevin E. Foltz,William R. Simpson,Institute for Defense Analyses - cover

Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World

Kevin E. Foltz, William R. Simpson, Institute for Defense Analyses

0 recensioni
Con la tua recensione raccogli punti Premium
pagabile con 18App pagabile con Carta del Docente
Articolo acquistabile con 18App e Carta del Docente
Anno: 2020
Rilegatura: Hardback
Pagine: 314 p.
Testo in English
Dimensioni: 235 x 156 mm
Peso: 454 gr.
  • EAN: 9780367531737

€ 77,49

€ 81,57
(-5%)

Punti Premium: 78

Venduto e spedito da IBS

Attualmente non disponibile
Leggi qui l'informativa sulla privacy
Inserisci la tua email ti avviseremo quando sarà disponibile
spinner

Grazie, riceverai una mail appena il prodotto sarà disponibile

Non è stato possibile elaborare la tua richiesta, riprova.

Gaia la libraia

Gaia la libraia Vuoi ricevere un'email sui tuoi prodotti preferiti? Chiedi a Gaia, la tua assistente personale

Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions, derived from 16 years of research, pilots, and operational trials in putting an enterprise system together. The chapters cover specific advanced topics derived from painful mistakes and numerous revisions of processes. This book covers many of the topics omitted from the first book including multi-factor authentication, cloud key management, enterprise change management, entity veracity, homomorphic computing, device management, mobile ad hoc, big data, mediation, and several other topics. The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. This is a unique approach to end-to-end security and fills a niche in the market.
Gaia la libraia

Gaia la libraia Vuoi ricevere un'email sui tuoi prodotti preferiti? Chiedi a Gaia, la tua assistente personale

Note legali