Security in a Web 2.0+ World

A Standards-Based Approach

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Security in a Web 2.0+ World by Carlos Curtis Solari, Wiley
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Carlos Curtis Solari ISBN: 9780470971086
Publisher: Wiley Publication: April 27, 2010
Imprint: Wiley Language: English
Author: Carlos Curtis Solari
ISBN: 9780470971086
Publisher: Wiley
Publication: April 27, 2010
Imprint: Wiley
Language: English

Discover how technology is affecting your business, and why typical security mechanisms are failing to address the issue of risk and trust.

Security for a Web 2.0+ World looks at the perplexing issues of cyber security, and will be of interest to those who need to know how to make effective security policy decisions to engineers who design ICT systems – a guide to information security and standards in the Web 2.0+ era. It provides an understanding of IT security in the converged world of communications technology based on the Internet Protocol.

Many companies are currently applying security models following legacy policies or ad-hoc solutions. A series of new security standards (ISO/ITU) allow security professionals to talk a common language. By applying a common standard, security vendors are able to create products and services that meet the challenging security demands of technology further diffused from the central control of the local area network. Companies are able to prove and show the level of maturity of their security solutions based on their proven compliance of the recommendations defined by the standard.

Carlos Solari and his team present much needed information and a broader view on why and how to use and deploy standards. They set the stage for a standards-based approach to design in security, driven by various factors that include securing complex information-communications systems, the need to drive security in product development, the need to better apply security funds to get a better return on investment.

Security applied after complex systems are deployed is at best a patchwork fix. Concerned with what can be done now using the technologies and methods at our disposal, the authors set in place the idea that security can be designed in to the complex networks that exist now and for those in the near future. Web 2.0 is the next great promise of ICT – we still have the chance to design in a more secure path.

Time is of the essence – prevent-detect-respond!

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Discover how technology is affecting your business, and why typical security mechanisms are failing to address the issue of risk and trust.

Security for a Web 2.0+ World looks at the perplexing issues of cyber security, and will be of interest to those who need to know how to make effective security policy decisions to engineers who design ICT systems – a guide to information security and standards in the Web 2.0+ era. It provides an understanding of IT security in the converged world of communications technology based on the Internet Protocol.

Many companies are currently applying security models following legacy policies or ad-hoc solutions. A series of new security standards (ISO/ITU) allow security professionals to talk a common language. By applying a common standard, security vendors are able to create products and services that meet the challenging security demands of technology further diffused from the central control of the local area network. Companies are able to prove and show the level of maturity of their security solutions based on their proven compliance of the recommendations defined by the standard.

Carlos Solari and his team present much needed information and a broader view on why and how to use and deploy standards. They set the stage for a standards-based approach to design in security, driven by various factors that include securing complex information-communications systems, the need to drive security in product development, the need to better apply security funds to get a better return on investment.

Security applied after complex systems are deployed is at best a patchwork fix. Concerned with what can be done now using the technologies and methods at our disposal, the authors set in place the idea that security can be designed in to the complex networks that exist now and for those in the near future. Web 2.0 is the next great promise of ICT – we still have the chance to design in a more secure path.

Time is of the essence – prevent-detect-respond!

More books from Wiley

Cover of the book The Externally Focused Quest by Carlos Curtis Solari
Cover of the book The End of Finance by Carlos Curtis Solari
Cover of the book Zukunftssicherung durch HR Trend Management by Carlos Curtis Solari
Cover of the book Organometallics by Carlos Curtis Solari
Cover of the book Introduction to Astronomy and Cosmology by Carlos Curtis Solari
Cover of the book Animal Signaling and Function by Carlos Curtis Solari
Cover of the book The Art of Capital Restructuring by Carlos Curtis Solari
Cover of the book The Contrarian Effect by Carlos Curtis Solari
Cover of the book Nanostructured Polymer Membranes, Volume 1 by Carlos Curtis Solari
Cover of the book Impromptu by Carlos Curtis Solari
Cover of the book Mauerwerk Kalender 2016 by Carlos Curtis Solari
Cover of the book Piezoelectric Energy Harvesting by Carlos Curtis Solari
Cover of the book The Israel/Palestine Reader by Carlos Curtis Solari
Cover of the book Dewhurst's Textbook of Obstetrics and Gynaecology by Carlos Curtis Solari
Cover of the book Mitarbeiter und Teams managen mit Drucker, Buffett, Roosevelt & Co. by Carlos Curtis Solari
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy