رکورد قبلیرکورد بعدی

" The second economy : "


Document Type : BL
Record Number : 602299
Doc. No : b431518
Main Entry : Grobman, Steve
Title & Author : The second economy : : the race for trust, treasure and time in the cybersecurity war /\ Steve Grobman, Allison Cerra ; foreword by Christopher Young
Page. NO : 1 online resource (xxviii, 200 pages) :: illustrations (some color)
ISBN : 9781484222294
: : 1484222296
: 9781484222287
: 1484222288
Bibliographies/Indexes : Includes bibliographical references and index
Contents : At a Glance; Contents; About the Authors; About the Technical Reviewer; Acknowledgements; Foreword; Prologue; Part I: A Second Bite at the Problem; Chapter 1: The Second Side of the Story; The Cryptowars; Follow the Silk Road; "You Must Be Punished"; Enemy Within the Gates; Gone Phishing; A State of Emergency; A Second Thought; Notes; Chapter 2: The Second Nature of Markets; Making It Up in Volume; Without a Trace; Follow the Money Trail; Tick Tock; Rise of the Machines; A Second Thought; Notes; Chapter 3: Seconding the Cause; Déjà vu; Leaking Secrets; A Legion Joins the Fight
: A Second ThoughtNotes; Chapter 4: No Second Chance; Somebody Crossed the Rubicon; A Cyber Pearl Harbor; Fun with a Dash of Smarts; A Second Thought; Notes; Chapter 5: Second-Guessing the Obvious; Enough, Already!; Passing the Buck; The Long Game; A Second Thought; Notes; Part II: A Second Look at Conventional Wisdom; Chapter 6: Playing Second Fiddle; Initial Battle Lines Are Drawn; The Underestimated Troublemakers; The Domesticated Heroes; A Second Thought; Notes; Chapter 7: Take a Second Look; Taking the Keep; Securing the Virtual Castle; Erring on the Side of Caution
: Ignoring One's DefensesA Second Thought; Notes; Chapter 8: When Seconds Matter; Losing the Race; The More Things Change . . .; The Red Queen's Head Start; A Second Thought; Notes; Chapter 9: Second to None; Doing the Unthinkable; Protecting One's Advantage; Celebrating a Hollow Victory; Facing the Dilemma; Punishing the Free Rider; Raising the Elevation; A Second Thought; Notes; Chapter 10: Cybersecurity's Second Wind; Raising the Noise; Obeying the Law; Running the Gauntlet; A Second Thought; Notes; Epilogue; Index
Abstract : In today's hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, virtually every step we take, every transaction we initiate, and every interaction we have are supported in some way by this vast global infrastructure. This set of interconnected systems comprises the fundamental building blocks of the second economy - the very foundation of our first economy. And adversaries, whether motivated by profit, principle or province, are singularly focused on winning the race through a relentless portfolio of shifting attack vectors. The complexity and volume of these attacks are seemingly unstoppable. And, while the significant financial risk for compromised organizations is very real, the larger and more insidious threat rests with the erosion of the hard-earned trust of customers and other stakeholders. A foundational element of the actual economy, trust, once lost, is not easily recaptured. When it is shaken through a breach, seconds matter. To successfully compete against more sophisticated adversaries and protect their organizations, IT security professionals must take a second look at established security notions and challenge their thinking. Being second to none in this fight is essential, as the effectiveness and ROI of security solutions are increasingly measured by the business outcomes they enable. Offering a practical prescription for both private and public organizations to remediate threats and maintain a competitive pace, The Second Economy is a must read for those who endeavor to lead and thrive in an ever-shifting environment. Make no mistake about it, we are running a race. This is a race against a faceless, nameless adversary - one that dictates the starting line, the rules of the road, and what trophies are at stake. Established assumptions must be challenged, strategies must be revised, and long-held practices must be upended to run this race and effectively compete in The Second Economy. What You Will Learn: Understand the value of time and trust in a cyber-warfare world, enabling agile and intelligent organizations to minimize their risk of falling victim to the next attack How to accelerate response time by adopting a holistic approach that eliminates friction across the threat defense lifecycle, from protection to detection to correction How to gain sustainable competitive advantage by seizing first mover advantage in deploying solutions across an open, integrated security framework Who This Book Is For: Senior-level IT decision makers concerned with ascribing business value to a robust security strategy. The book also addresses business decision makers who must be educated about the pervasive and growing cyber threatscape (including CXOs, board directors, and functional leaders) as well as general business employees to understand how they may become unwitting participants in a complex cyber war
Subject : Computer security.
Subject : Computer networks-- Security measures.
Subject : Internet-- Security measures.
Dewey Classification : ‭005.8‬
LC Classification : ‭QA76.9.A25‬
Added Entry : Cerra, Allison
Added Entry : Ohio Library and Information Network.
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟