The digital big bang : (Record no. 87333)

000 -LEADER
fixed length control field 07027cam a2200469 i 4500
003 - CONTROL NUMBER IDENTIFIER
control field CITU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240512163843.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr aa aaaaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190609s2019 inu 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2019943278
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119617365
Qualifying information (hardcover)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781119617389
Qualifying information (ebk)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781119617402
Qualifying information (ebk)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number D52766 2019
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
245 04 - TITLE STATEMENT
Title The digital big bang :
Remainder of title the hard stuff, the soft stuff, and the future of cybersecurity /
Statement of responsibility, etc [editor] Phil Quade, CISO, Fortinet.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Indianapolis, Indiana :
Name of publisher, distributor, etc John Wiley & Sons, Inc.,
Date of publication, distribution, etc [2019]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
500 ## - GENERAL NOTE
General note Includes index.
505 0# - CONTENTS
Formatted contents note Table of Contents<br/>Introduction xvii<br/><br/>Section 1: Binding Strategies 1<br/><br/>1 Speed 5<br/><br/>Speed: The Nucleus of the Cyberfrontier 7<br/>Roland Cloutier, ADP<br/><br/>Is Speed an Advantage? It Depends on the Context 18<br/>Scott Charney, Microsoft<br/><br/>2 Connectivity 23<br/><br/>Managing the Intensifying Connectivity of the IoT Era 25<br/>Brian Talbert, Alaska Airlines<br/><br/>Cyberspace: Making Some Sense of It All 30<br/>Chris Inglis, Former NSA Deputy Director<br/><br/>Section 2: Elementary Shortfalls 43<br/><br/>3 Authentication 47<br/><br/>Authentication, Data Integrity, Nonrepudiation, Availability, and Confidentiality: The Five Pillars of Security 50<br/>Mike McConnell, Former Director of National Intelligence<br/><br/>Authentication and Models of Trust 58<br/>Shannon Lietz, Intuit<br/><br/>4 Patching 65<br/><br/>Patching: A Growing Challenge and a Needed Discipline 68<br/>Chris Richter, Former VP of Global Security Services, CenturyLink<br/><br/>Conquer or Be Conquered 74<br/>Renee Tarun, Fortinet<br/><br/>5 Training 79<br/><br/>Fill the Skills Gap with an Environment of Continual Training 82<br/>Chris McDaniels, CT Cubed, Inc.<br/><br/>Employee Training is Key for Cybersecurity 89<br/>Mo Katibeh, AT&T<br/><br/>Training is a Mindset 97<br/>Dave Rankin, Verisign<br/><br/>Section 3: Fundamental Strategies 103<br/><br/>6 Cryptography 105<br/><br/>Cryptography: The Backbone of Cybersecurity 108<br/>Taher Elgamal, Salesforce<br/><br/>Cryptography: The Good, the Bad, and the Future 117<br/>Dan Boneh, Stanford<br/><br/>7 Access Control 127<br/><br/>Managing Access in Challenging Environments 130<br/>Erik Devine, Riverside Health<br/><br/>A Systematic Approach to Access Control 136<br/>George Do, Equinix<br/><br/>8 Segmentation 143<br/><br/>Successful Segmentation Isn’t Separation: It’s Collaboration 147<br/>Colin Anderson, Levi Strauss & Co.<br/><br/>Why We Need to Segment Networks 153<br/>Hussein Syed, RWJBarnabas Health<br/><br/>Section 4: Advanced Strategies 161<br/><br/>9 Visibility 164<br/><br/>Visibility: Identifying Pathogens, Risk Factors, and Symptoms of Cyberattacks 167<br/>Michael Chertoff, Former Secretary, Department of Homeland Security<br/><br/>20/20 Insight: Redefining Visibility to Stop Modern Cybercrime Syndicates 173<br/>Tim Crothers, Target<br/><br/>The Challenge of Visibility 180<br/>Daniel Hooper, PIMCO<br/><br/>10 Inspection 188<br/><br/>In and Out of the Shadows: The Visibility That Inspection Enables is Not Confined to Technology Alone 192<br/>Ed Amoroso, TAG Cyber<br/><br/>The Fundamental Importance of Inspection 199<br/>Michael Johnson, Capital One<br/><br/>11 Failure Recovery 206<br/><br/>Preparation, Response, and Recovery 209<br/>Thad Allen, Booz Allen Hamilton<br/><br/>Cyber Event Recovery 219<br/>Simon Lambe, Royal Mail<br/><br/>Section 5: Higher-Order Dimensions 223<br/><br/>12 Complexity Management 226<br/><br/>Shift Your Mindset to Manage Complexity 229<br/>Michael Daniel, Cyber Threat Alliance<br/><br/>Seven Steps to Reducing Complexity 238<br/>Jay Gonzales, Samsung<br/><br/>13 Privacy 246<br/><br/>Don’t Panic! Security Pros Must Learn to Embrace the New Era of Privacy 249<br/>Kevin Miller, MGM Resorts International<br/><br/>Stricter Privacy Regulations Are Driving the Conversations—and Innovations—We Need 259<br/>Peter Keenan, Global Financial Services Firm<br/><br/>14 Human Frailty 265<br/><br/>Overcoming Human Frailty: People and the Power of Obligation 268<br/>Kevin Kealy, Ingram Micro<br/><br/>Overcoming Human Frailty by Design 274<br/>Theresa Payton, Fortalice<br/><br/>The Future 282<br/><br/>Why Cybersecurity Needs AI 290<br/>Michael Xie, Fortinet<br/><br/>The Future of Cybersecurity 293<br/>Ken Xie, Fortinet<br/><br/>Index 301
520 ## - SUMMARY, ETC.
Summary, etc Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges <br/><br/>Humankind’s efforts to explain the origin of the cosmos birthed disciplines such as physics and chemistry. Scientists conceived of the cosmic ‘Big Bang’ as an explosion of particles—everything in the universe centered around core elements and governed by laws of matter and gravity. In the modern era of digital technology, we are experiencing a similar explosion of ones and zeros, an exponentially expanding universe of bits of data centered around the core elements of speed and connectivity. One of the disciplines to emerge from our efforts to make sense of this new universe is the science of cybersecurity. Cybersecurity is as central to the Digital Age as physics and chemistry were to the Scientific Age. The Digital Big Bang explores current and emerging knowledge in the field of cybersecurity, helping readers think like scientists to master cybersecurity principles and overcome cybersecurity challenges. <br/><br/>This innovative text adopts a scientific approach to cybersecurity, identifying the science’s fundamental elements and examining how these elements intersect and interact with each other. Author Phil Quade distills his over three decades of cyber intelligence, defense, and attack experience into an accessible, yet detailed, single-volume resource. Designed for non-specialist business leaders and cybersecurity practitioners alike, this authoritative book is packed with real-world examples, techniques, and strategies no organization should be without. Contributions from many of the world’s leading cybersecurity experts and policymakers enable readers to firmly grasp vital cybersecurity concepts, methods, and practices.
545 0# - BIOGRAPHICAL OR HISTORICAL DATA
Biographical or historical note About the Author<br/>Phil Quade is the CISO of Fortinet. Phil brings more than three decades of cyber intelligence, defense, and attack experience, working across foreign, government, and commercial industry sectors.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information technology
General subdivision Security measures
-- Management.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyber intelligence (Computer security)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cyberterrorism
General subdivision Prevention.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Quade, Phil,
Relator term editor.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://onlinelibrary.wiley.com/doi/book/10.1002/9781119617396
Link text Full text is available at Wiley Online Library Click here to view
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 2
e epcn
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type EBOOK
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Source of acquisition Inventory number Full call number Barcode Date last seen Price effective from Item type
          COLLEGE LIBRARY COLLEGE LIBRARY 2024-05-12 ALBASA Consortium 52212 005.8 D5695 2019 CL-52212 2024-05-12 2024-05-12 EBOOK