The five technological forces disrupting security : (Record no. 20401)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02211nam a2200229Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250520102958.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780128050958 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK 5105.59 .T55 2018 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Till, Steve Van |
Relator term | author |
245 #4 - TITLE STATEMENT | |
Title | The five technological forces disrupting security : |
Remainder of title | how cloud, social, mobile, big data and IoT are transforming physical security in the digital age / |
Statement of responsibility, etc. | Steve Van Till |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | United Kingdom : |
Name of publisher, distributor, etc. | Butterworth Heinemann ; |
Date of publication, distribution, etc. | c2018 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xviii, 224 pages ; |
Dimensions | 24 cm. |
365 ## - TRADE PRICE | |
Price amount | USD31.85 |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1.From packages to people -- Section 1: The Cloud -- 2.The run-up to cloud -- 3.The tipping point -- Section 2: Mobile -- 4.Going mobile -- 5.Security ecosystems -- 6.Altered presence -- 7.What can mobile do for me? -- Section 3: The Internet of Things (IoT) -- 8.Why IoT matters in security -- 9.All security is now cybersecurity -- 10.IoT technology and standards -- 11.The new playing field -- Section 4: Data: bigger, smarter, faster -- 12.Bigger -- 13.Smarter -- 14.Faster -- 15.Data-driven security -- Section 5: Social + identity -- 16.Who are you? -- 17.Social saves lives -- 18.On the internet, no one knows you're a dog -- 19.Social spaces -- Section 6: The future -- 20.The secrets of the universe. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | The book explores the major technological forces currently driving digital disruption in the security industry, and what they foretell for the future.The book provides a high-level perspective on how the industry is changing as a whole, as well as practical guidance on how to incorporate these new technologies to create better security solutions. It also examines key questions on how these new technologies have lowered barriers for new entrants in the field and how they are likely to change market dynamics and affect customer choices.Set in the context of one of the early dot.com companies to enter physical security, the narrative is written for professionals from Chief Security Officers and systems integrators to product managers and investors. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTER NETWORKS -- SECURITY MEASURES |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | Gen. Ed. - CCIT | LRC - Main | National University - Manila | General Circulation | 05/24/2021 | Purchased - Amazon | 31.85 | GC TK 5105.59 .T55 2018 | NULIB000018160 | 05/20/2025 | c.1 | 05/20/2025 | Books |