The five technological forces disrupting security : (Record no. 20401)

MARC details
000 -LEADER
fixed length control field 02211nam a2200229Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field NULRC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250520102958.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250520s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128050958
040 ## - CATALOGING SOURCE
Transcribing agency NULRC
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK 5105.59 .T55 2018
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Till, Steve Van
Relator term author
245 #4 - TITLE STATEMENT
Title The five technological forces disrupting security :
Remainder of title how cloud, social, mobile, big data and IoT are transforming physical security in the digital age /
Statement of responsibility, etc. Steve Van Till
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. United Kingdom :
Name of publisher, distributor, etc. Butterworth Heinemann ;
Date of publication, distribution, etc. c2018
300 ## - PHYSICAL DESCRIPTION
Extent xviii, 224 pages ;
Dimensions 24 cm.
365 ## - TRADE PRICE
Price amount USD31.85
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note 1.From packages to people -- Section 1: The Cloud -- 2.The run-up to cloud -- 3.The tipping point -- Section 2: Mobile -- 4.Going mobile -- 5.Security ecosystems -- 6.Altered presence -- 7.What can mobile do for me? -- Section 3: The Internet of Things (IoT) -- 8.Why IoT matters in security -- 9.All security is now cybersecurity -- 10.IoT technology and standards -- 11.The new playing field -- Section 4: Data: bigger, smarter, faster -- 12.Bigger -- 13.Smarter -- 14.Faster -- 15.Data-driven security -- Section 5: Social + identity -- 16.Who are you? -- 17.Social saves lives -- 18.On the internet, no one knows you're a dog -- 19.Social spaces -- Section 6: The future -- 20.The secrets of the universe.
520 ## - SUMMARY, ETC.
Summary, etc. The book explores the major technological forces currently driving digital disruption in the security industry, and what they foretell for the future.The book provides a high-level perspective on how the industry is changing as a whole, as well as practical guidance on how to incorporate these new technologies to create better security solutions. It also examines key questions on how these new technologies have lowered barriers for new entrants in the field and how they are likely to change market dynamics and affect customer choices.Set in the context of one of the early dot.com companies to enter physical security, the narrative is written for professionals from Chief Security Officers and systems integrators to product managers and investors.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTER NETWORKS -- SECURITY MEASURES
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     Gen. Ed. - CCIT LRC - Main National University - Manila General Circulation 05/24/2021 Purchased - Amazon 31.85   GC TK 5105.59 .T55 2018 NULIB000018160 05/20/2025 c.1 05/20/2025 Books