Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Enterprise level security 2 : advanced topics in an uncertain world
by
Foltz, Kevin E., author
, Simpson, William Randolph, 1946- author
in
Computer networks Security measures.
/ Industries Security measures.
2020
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Enterprise level security 2 : advanced topics in an uncertain world
by
Foltz, Kevin E., author
, Simpson, William Randolph, 1946- author
in
Computer networks Security measures.
/ Industries Security measures.
2020
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Enterprise level security 2 : advanced topics in an uncertain world
BOOK
Enterprise level security 2 : advanced topics in an uncertain world
2020
Available to read in the library!
Request Book From Autostore
and Choose the Collection Method
Overview
\"Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions, derived from 16 years of research, pilots, and operational trials in putting an enterprise system together. The chapters cover specific advanced topics derived from painful mistakes and numerous revisions of processes. This book covers many of the topics omitted from the first book including multi-factor authentication, cloud key management, enterprise change management, entity veracity, homomorphic computing, device management, mobile ad hoc, big data, mediation, and several other topics. The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. This is a unique approach to end-to-end security and fills a niche in the market\"-- Provided by publisher.
Publisher
CRC Press
ISBN
9780367531737, 9780367532963
Item info:
1
item available
1
item total in all locations
| Call Number | Copies | Material | Location |
|---|---|---|---|
| TK5105.59 .F655 2020 | 1 | BOOK | AUTOSTORE |
This website uses cookies to ensure you get the best experience on our website.