The Digital Big Bang (Record no. 69128)

000 -LEADER
fixed length control field 07224cam a2200493Ia 4500
001 - CONTROL NUMBER
control field on1112424847
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711203530.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190831s2019 inu o 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119617396
-- (electronic bk. : oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119617391
-- (electronic bk. : oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119617383
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119617389
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- (print)
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
100 1# - AUTHOR NAME
Author Quade, Phil.
245 14 - TITLE STATEMENT
Title The Digital Big Bang
Sub Title The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity /
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Indianapolis, IN :
Publisher Wiley,
Year of publication 2019.
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource (339 p.)
500 ## - GENERAL NOTE
Remark 1 Description based upon print version of record.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Cover; Title Page; Copyright; About the Author; Contributors; Acknowledgments; Content; Introduction; The Cosmic Big Bang: The Birth of the Physical Universe and the Human Society That Emerged; The Digital Big Bang: The Birth of the Digital Universe; The Scientific Revolution; The Bang Begins; What We Got Right; What We Got Wrong; An Unwarranted Assumption of Trust; An Honest Assessment of the Current State; What Cybercrimes Exploit; What We Can Get Right Now; The Digital Nucleus; Section 1 Binding Strategies: The Core of Cybersecurity; Chapter 1 Speed; Speed: The Nucleus of the Cyberfrontier
505 8# - FORMATTED CONTENTS NOTE
Remark 2 Is Speed an Advantage? It Depends on the ContextChapter 2 Connectivity; Managing the Intensifying Connectivity of the IoT Era; Cyberspace: Making Some Sense of It All; Section 2 Elementary Shortfalls :The Things we didn't get Right at the Beginning; Chapter 3 Authentication; Authentication, Data Integrity, Nonrepudiation, Availability, and Confidentiality: The Five Pillars of Security; Authentication and Models of Trust; Chapter 4 Patching; Patching: A Growing Challenge and a Needed Discipline; Conquer or Be Conquered; Chapter 5 Training
505 8# - FORMATTED CONTENTS NOTE
Remark 2 Fill the Skills Gap with an Environment of Continual TrainingEmployee Training Is Key for Cybersecurity; Training Is a Mindset; Section 3 Fundamental Strategies: Proven Strategies that Don't Let us Down; Chapter 6 Cryptography; Cryptography: The Backbone of Cybersecurity; Cryptography: The Good, the Bad, and the Future; Chapter 7 Access Control; Managing Access in Challenging Environments; A Systematic Approach to Access Control; Chapter 8 Segmentation; Successful Segmentation Isn't Separation: It's Collaboration; Why We Need to Segment Networks
505 8# - FORMATTED CONTENTS NOTE
Remark 2 Section 4 Advanced Strategies: Sophisticated Cybersecurity OperationsChapter 9 Visibility; Visibility: Identifying Pathogens, Risk Factors, and Symptoms of Cyberattacks; 20/20 Insight: Redefining Visibility to Stop Modern Cybercrime Syndicates; The Challenge of Visibility; Chapter 10 Inspection; In and Out of the Shadows: The Visibility That Inspection Enables Is Not Confined to Technology Alone; The Fundamental Importance of Inspection; Chapter 11 Failure Recovery; Preparation, Response, and Recovery; Cyber Event Recovery
505 8# - FORMATTED CONTENTS NOTE
Remark 2 Section 5 Higher-Order Dimensions: Where Human Factors Can Eclipse Computing WizardryChapter 12 Complexity Management; Shift Your Mindset to Manage Complexity; Seven Steps to Reducing Complexity; Chapter 13 Privacy; Don't Panic! Security Pros Must Learn to Embrace the New Era of Privacy; Stricter Privacy Regulations Are Driving the Conversations-and Innovations-We Need; Chapter 14 Human Frailty; Overcoming Human Frailty: People and the Power of Obligation; Overcoming Human Frailty by Design; The Future; Unifying Forces; Relationships; Informed Optimism; Pursuit of Facts and Wisdom
500 ## - GENERAL NOTE
Remark 1 Machines That Serve People
520 ## - SUMMARY, ETC.
Summary, etc Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges Humankind's efforts to explain the origin of the cosmos birthed disciplines such as physics and chemistry. Scientists conceived of the cosmic 'Big Bang' as an explosion of particles-everything in the universe centered around core elements and governed by laws of matter and gravity. In the modern era of digital technology, we are experiencing a similar explosion of ones and zeros, an exponentially expanding universe of bits of data centered around the core elements of speed and connectivity. One of the disciplines to emerge from our efforts to make sense of this new universe is the science of cybersecurity. Cybersecurity is as central to the Digital Age as physics and chemistry were to the Scientific Age. The Digital Big Bang explores current and emerging knowledge in the field of cybersecurity, helping readers think like scientists to master cybersecurity principles and overcome cybersecurity challenges. This innovative text adopts a scientific approach to cybersecurity, identifying the science's fundamental elements and examining how these elements intersect and interact with each other. Author Phil Quade distills his over three decades of cyber intelligence, defense, and attack experience into an accessible, yet detailed, single-volume resource. Designed for non-specialist business leaders and cybersecurity practitioners alike, this authoritative book is packed with real-world examples, techniques, and strategies no organization should be without. Contributions from many of the world's leading cybersecurity experts and policymakers enable readers to firmly grasp vital cybersecurity concepts, methods, and practices. This important book: -Guides readers on both fundamental tactics and advanced strategies -Features observations, hypotheses, and conclusions on a wide range of cybersecurity issues -Helps readers work with the central elements of cybersecurity, rather than fight or ignore them -Includes content by cybersecurity leaders from organizations such as Microsoft, Target, ADP, Capital One, Verisign, AT&T, Samsung, and many others -Offers insights from national-level security experts including former Secretary of Homeland Security Michael Chertoff and former Director of National Intelligence Mike McConnell The Digital Big Bang is an invaluable source of information for anyone faced with the challenges of 21st century cybersecurity in all industries and sectors, including business leaders, policy makers, analysts and researchers as well as IT professionals, educators, and students.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1002/9781119617396
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computers.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Security / Cryptography.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
-- (OCoLC)fst00872484
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computers.
-- (OCoLC)fst00872776
994 ## -
-- 92
-- DG1

No items available.