Identify real security risks and skip the hype
After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today’s IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.
With a foreword by security expert Bruce Schneier, Security 2020: Reduce Security Risks This Decade supplies a roadmap to real IT security for the coming decade and beyond.
"synopsis" may belong to another edition of this title.
Learn what's real, what's hype, and what you can do about it
For decades, security experts and their IT peers have battled the black hats. Yet the threats are as prolific as ever and more sophisticated. Compliance requirements are evolving rapidly and globalization is creating new technology pressures. Risk mitigation is paramount. What lies ahead?
Doug Howard and Kevin Prince draw upon their vast experience of providing security services to many Fortune-ranked companies, as well as small and medium businesses. Along with their panel of security expert contributors, they offer real-world experience that provides a perspective on security past, present, and future. Some risk scenarios may surprise you. Some may embody fears you have already considered. But all will help you make tomorrow's IT world a little more secure than today's.
Over 50 industry experts weigh in with their thoughts
Review the history of security breaches
Explore likely future threats, including social networking concerns and doppelganger attacks
Understand the threat to Unified Communication and Collaboration (UCC) technologies
Consider the impact of an attack on the global financial system
Look at the expected evolution of intrusion detection systems, network access control, and related safeguards
Learn to combat the risks inherent in mobile devices and cloud computing
Study 11 chilling and highly possible scenarios that might happen in the future
Doug Howard, a 20-year IT security veteran, is the CEO of VBrick Systems and previously held positions as CSO of Perimeter E-Security, COO of BT Counterpane, and VP of Security and Business Continuity at AT&T.
Kevin Prince has spent over 20 years in IT, with the majority of that time focused on information security. Kevin has been everything from founder and CEO of his own information security company to Chief Technology Officer of Perimeter E-Security, one of the largest managed security service providers in the nation.
"About this title" may belong to another edition of this title.
Book Description Wiley, 2010. Paperback. Book Condition: New. Never used!. Bookseller Inventory # P110470639555
Book Description Wiley, 2010. Paperback. Book Condition: New. Brand New!. Bookseller Inventory # VIB0470639555
Book Description Wiley. PAPERBACK. Book Condition: New. 0470639555 New Condition. Bookseller Inventory # NEW7.0180150