Description

Book Synopsis
The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable.
In this exciting new book from security expert Kathleen M. Moriarty, the examination of all five trends uncovers opportunities to change the state of information security. Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space.

Table of Contents
Chapter 1. Interconnected TrendsChapter 2. Board Level Program Evaluation and Guidance Chapter 3. Architect a Secure Network with Less Chapter 4. Encryption Chapter 5. Transport Evolution: The Encrypted Stack Chapter 6. Authentication and Authorization Chapter 7. The End Point Chapter 8. Incident Prevention, Detection, and Response Chapter 9. Looking Forward

Transforming Information Security: Optimizing

Product form

£43.69

Includes FREE delivery

RRP £45.99 – you save £2.30 (5%)

Order before 4pm tomorrow for delivery by Mon 19 Jan 2026.

A Paperback / softback by Kathleen M. Moriarty

Out of stock


    View other formats and editions of Transforming Information Security: Optimizing by Kathleen M. Moriarty

    Publisher: Emerald Publishing Limited
    Publication Date: 02/07/2020
    ISBN13: 9781839099311, 978-1839099311
    ISBN10: 1839099313
    Also in:
    Data encryption

    Description

    Book Synopsis
    The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable.
    In this exciting new book from security expert Kathleen M. Moriarty, the examination of all five trends uncovers opportunities to change the state of information security. Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space.

    Table of Contents
    Chapter 1. Interconnected TrendsChapter 2. Board Level Program Evaluation and Guidance Chapter 3. Architect a Secure Network with Less Chapter 4. Encryption Chapter 5. Transport Evolution: The Encrypted Stack Chapter 6. Authentication and Authorization Chapter 7. The End Point Chapter 8. Incident Prevention, Detection, and Response Chapter 9. Looking Forward

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account