|
|
Showing 1 - 2 of
2 matches in All Departments
Enterprise Level Security 2: Advanced Topics in an Uncertain World
follows on from the authors' first book on Enterprise Level
Security (ELS), which covered the basic concepts of ELS and the
discoveries made during the first eight years of its development.
This book follows on from this to give a discussion of advanced
topics and solutions, derived from 16 years of research, pilots,
and operational trials in putting an enterprise system together.
The chapters cover specific advanced topics derived from painful
mistakes and numerous revisions of processes. This book covers many
of the topics omitted from the first book including multi-factor
authentication, cloud key management, enterprise change management,
entity veracity, homomorphic computing, device management, mobile
ad hoc, big data, mediation, and several other topics. The ELS
model of enterprise security is endorsed by the Secretary of the
Air Force for Air Force computing systems and is a candidate for
DoD systems under the Joint Information Environment Program. The
book is intended for enterprise IT architecture developers,
application developers, and IT security professionals. This is a
unique approach to end-to-end security and fills a niche in the
market.
Enterprise Level Security 2: Advanced Topics in an Uncertain World
follows on from the authors' first book on Enterprise Level
Security (ELS), which covered the basic concepts of ELS and the
discoveries made during the first eight years of its development.
This book follows on from this to give a discussion of advanced
topics and solutions, derived from 16 years of research, pilots,
and operational trials in putting an enterprise system together.
The chapters cover specific advanced topics derived from painful
mistakes and numerous revisions of processes. This book covers many
of the topics omitted from the first book including multi-factor
authentication, cloud key management, enterprise change management,
entity veracity, homomorphic computing, device management, mobile
ad hoc, big data, mediation, and several other topics. The ELS
model of enterprise security is endorsed by the Secretary of the
Air Force for Air Force computing systems and is a candidate for
DoD systems under the Joint Information Environment Program. The
book is intended for enterprise IT architecture developers,
application developers, and IT security professionals. This is a
unique approach to end-to-end security and fills a niche in the
market.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
Chernobyl
Jared Harris, Stellan Skarsgard, …
Blu-ray disc
R507
Discovery Miles 5 070
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
|