Atnaujinkite slapukų nuostatas

El. knyga: Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age

(President and CEO, Brivo, Inc)
  • Formatas: EPUB+DRM
  • Išleidimo metai: 18-Aug-2017
  • Leidėjas: Butterworth-Heinemann Inc
  • Kalba: eng
  • ISBN-13: 9780128050965
Kitos knygos pagal šią temą:
  • Formatas: EPUB+DRM
  • Išleidimo metai: 18-Aug-2017
  • Leidėjas: Butterworth-Heinemann Inc
  • Kalba: eng
  • ISBN-13: 9780128050965
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

The Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age explores the major technological forces currently driving digital disruption in the security industry, and what they foretell for the future. The book provides a high-level perspective on how the industry is changing as a whole, as well as practical guidance on how to incorporate these new technologies to create better security solutions. It also examines key questions on how these new technologies have lowered barriers for new entrants in the field and how they are likely to change market dynamics and affect customer choices. Set in the context of one of the early dot.com companies to enter physical security, the narrative is written for professionals from Chief Security Officers and systems integrators to product managers and investors.

  • Explores the five major technological forces driving digital change in commercial security
  • Shows practitioners how to align security strategies with these inevitable changes
  • Examines how the consumerization of security will change the vendor playing field
  • Illustrates how security professionals can leverage these changes in their own careers
  • Provides an adoption scorecard that ranks trends and timeline for impact

Daugiau informacijos

A robust overview of five technological forces that are fundamentally altering corporate physical security practices and policies
About the Author xiii
Preface xv
Acknowledgments xix
Chapter 1 From Packages to People
1(16)
The Consumerization of Security
3(1)
Early Clouds, Sunny Skies
4(1)
An IoT Story
5(2)
From Premobile to Mobile First
7(1)
Big Data in Its Infancy
8(1)
Social Spaces
9(2)
Dot-Com Redux in Physical Security
11(1)
Technology Adoption in Physical Security
11(6)
Section 1 The Cloud
Chapter 2 The Run-Up to Cloud
17(12)
Cloud Meets an Industry of Late Adopters
17(1)
Skating to Where the Puck Has Been
18(1)
SaaS by Any Other Name
19(1)
Marketers Run With It
20(1)
Internet Protocol Blazes the Trail
21(1)
Before We Called It "Cloud"
22(1)
Five Essential Characteristics and Why They Matter
22(3)
Service Models: Applications vs Infrastructure
25(1)
Deployment Models: Public Clouds vs Private Clouds
26(3)
Chapter 3 The Tipping Point
29(12)
The Drivers of Adoption
29(1)
A Balanced View of Cyber Risks
30(1)
Beyond Stack-a-Box
30(1)
Are We More Conservative Than Our Customers?
31(1)
A Foothold for Cloud
32(1)
Leading Indicators
33(1)
The Barriers Are Down
33(1)
Easier for New Entrants
34(1)
Start-Ups Show Up to the Game
35(1)
The Innovator's Dilemma
35(1)
Disruption
36(1)
What Is My Cloud Strategy?
37(4)
Section 2 Mobile
Chapter 4 Going Mobile
41(8)
The Desk in Our Pockets
42(1)
Mobile First
43(1)
The Interactive Paradigm
44(1)
The Toothbrush Test
45(1)
Retention Matters
46(1)
Adoption
47(2)
Chapter 5 Security Ecosystems
49(12)
The Desktop Reincarnated
50(1)
Apps Have a Field Day
51(1)
Mobile Credentials
52(1)
Interactive Security
53(1)
Middleware for the Real World
54(2)
One Key to Rule Them All
56(2)
ApplePay for Spaces
58(1)
Don't We Get Any Standards Out of This?
58(3)
Chapter 6 Altered Presence
61(8)
Presence
61(1)
Passive Surveillance
62(1)
Known Knowns, Known Unknowns, and Unknown Unknowns
63(2)
Anthrometrics: Web Metrics IRL
65(1)
A Jewelry Case in Point
66(1)
Breathing the Data Exhaust
67(2)
Chapter 7 What Can Mobile Do for Me?
69(14)
What's in It for Me?
69(1)
Real-Time Situational Awareness
70(1)
Small Business
71(1)
Multilocation Businesses
71(1)
Property Management
72(1)
What About Residential?
73(1)
Biometrics & Multifactor Authentication
74(1)
Transformation
75(1)
What's My Mobile Strategy?
76(7)
Section 3 The Internet of Things (IoT)
Chapter 8 Why IoT Matters in Security
83(14)
Security: Already an IoT Business
84(1)
Ground Zero
85(1)
What Is IoT, Anyway?
86(1)
A Projection
87(2)
It's All About the Data
89(1)
Cheaper, Smaller, and More Discreet
90(1)
Big Wave or The Biggest Wave?
91(1)
IoT Will Become Part of Everything
92(2)
The Industrial Internet of Things
94(3)
Chapter 9 All Security Is Now Cybersecurity
97(10)
Life Imitating Art
98(1)
A Global, Residential, Commercial, and Even Universal Risk
99(1)
Cloud Security Redux... But Worse
100(1)
Device Authentication: Do I Know You?
101(1)
Orphans Without Governance
102(1)
The Update Treadmill
103(2)
A Path Forward
105(2)
Chapter 10 IoT Technology and Standards
107(20)
The Need for Standards
109(2)
Architecture Matters
111(1)
Building Blocks
112(2)
Gateways to the Future
114(1)
Wireless Whirlwind
115(2)
The Standards Battlefield
117(2)
Current State of Play
119(1)
Standards Organizations and Consortia
120(3)
Proprietary Frameworks
123(4)
Chapter 11 The New Playing Field
127(12)
What's Old Is New---At Least for Startups
128(2)
Large Tech & Telecom Eye Physical Security---Again
130(2)
Consumerization and IoT
132(2)
Will IoT be Disruptive?
134(1)
Adoption
134(1)
Strategy
135(1)
Coda: Is IoT Really a Category?
135(4)
Section 4 Data: Bigger, Smarter, Faster
Chapter 12 Bigger
139(8)
Can Big Data Save Your Life?
140(1)
Big Data Defined: The Four V's
141(1)
The Case of the Missing Data
142(2)
The Road to Volume
144(1)
How Not to Think About Big Data
145(2)
Chapter 13 Smarter
147(14)
What Do We Want to Know?
147(1)
Not One Size Fits All
148(2)
From Variety to Video and Back
150(2)
Big Security Data and ROI
152(1)
Methods to Cut Through the Madness
153(8)
Chapter 14 Faster
161(12)
Data Velocity
162(2)
Lessons From Cyber Security
164(2)
Artificial Intelligence
166(2)
Machine Learning
168(2)
Real Time Analytics
170(3)
Chapter 15 Data-Driven Security
173(10)
The Emergence of Data Analytics in Security
174(1)
Where Are the Solutions?
175(1)
Big Data, Now Arriving in the Cloud
175(1)
Data Priorities
176(1)
The Lack of Standards for Security Events
177(1)
Adoption, Transformation, and Strategy
178(5)
Section 5 Social + Identity
Chapter 16 Who Are You?
183(8)
What's in a Token?
184(1)
Social Me Is the New Me
185(1)
The Holy Grail of Universal Identity
186(2)
Identity Is the New Perimeter
188(3)
Chapter 17 Social Saves Lives
191(6)
Virtual Social Media Working Group
192(1)
The United Nations
192(1)
Social Media for Emergency Management (#SMEM)
193(1)
Power Shift
193(2)
Not Your Kid's Social Media
195(2)
Chapter 18 On the Internet, No One Knows You're a Dog
197(6)
Identity as a Service
198(1)
What Is an Identity Standard?
199(1)
Authentication vs Authorization
199(1)
Authentication Standards
200(3)
Chapter 19 Social Spaces
203(10)
What Does it Mean to be a Social Space?
204(2)
It's All About Identity
206(1)
Communication and Crowdsourcing
206(1)
Security as a Customer Experience
207(1)
Disruption
208(1)
Strategy
209(4)
Section 6 The Future
Chapter 20 The Secrets of the Universe
213(8)
Adoption Scorecard
214(4)
My Generation
218(1)
A New Mission for Security
219(1)
What Goes Around Comes Around
219(2)
Index 221
Steven Van Till is Co-Founder, President & CEO of Brivo, Inc. a pioneering cloud services provider of access control, video surveillance, mobile, and identity solutions delivered as a SaaS offering. He also serves as Chairman of the SIA Standards Committee, and is a frequent author and speaker for numerous security publications and forums, and the inventor of several patents in the field of physical security. In 2009, Steve was honored by Security Magazine as one of The Top 25 Most Influential People in the Security Industry.” Mr. Van Till was previously Director of Internet Consulting for Sapient Corporation, where he lead client strategy engagements for the first wave of the dot.com era. At the healthcare informatics company HCIA, Steve was responsible for Internet strategy for data analytics services. Steve also has more than 10 years of experience in wireless communications as Vice President of Software Development at Geostar, and as Director of Systems Engineering at Communications Satellite Corporation.