LEADER 03204nam 2200637 450 001 9910583384803321 005 20201016140557.0 010 $a0-12-805096-9 010 $a0-12-805095-0 035 $a(CKB)4100000000305189 035 $a(MiAaPQ)EBC4981408 035 $a(PPN)226416224 035 $a(EXLCZ)994100000000305189 100 $a20170915h20182018 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 14$aThe five technological forces disrupting security $ehow social, mobile, cloud and iot are fundamentally changing the practice of physical security /$fSteve Van Till 210 1$aOxford, England ;$aCambridge, Massachusetts :$cButterworth-Heinemann,$d2018. 210 4$d©2018 215 $a1 online resource (225 pages) 300 $aIncludes index. 330 $aThe Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age explores the major technological forces currently driving digital disruption in the security industry, and what they foretell for the future. The book provides a high-level perspective on how the industry is changing as a whole, as well as practical guidance on how to incorporate these new technologies to create better security solutions. Explores the five major technological forces driving digital change in commercial security; Shows practitioners how to align security strategies with these inevitable changes; Examines how the consumerization of security will change the vendor playing field; Illustrates how security professionals can leverage these changes in their own careers; Provides an adoption scorecard that ranks trends and timeline for impact. 606 $aComputer networks$xSecurity measures 606 $aComputer security 606 $aCloud computing$xSecurity measures 606 $aOnline social networks$xSecurity measures 606 $aMobile computing$xSecurity measures 606 $aBig data$xSecurity measures 606 $aRedes de ordenadores$xMedidas de seguridad$2CSICAU 606 $aMedios sociales$xMedidas de seguridad$2CSICAU 606 $aInformática en la nube$2CSICAU 606 $aDatos masivos$2CSICAU 606 $aSistemas de comunicaciones móviles$xMedidas de seguridad$2CSICAU 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security. 615 0$aCloud computing$xSecurity measures. 615 0$aOnline social networks$xSecurity measures. 615 0$aMobile computing$xSecurity measures. 615 0$aBig data$xSecurity measures. 615 7$aRedes de ordenadores$xMedidas de seguridad 615 7$aMedios sociales$xMedidas de seguridad. 615 7$aInformática en la nube, 615 7$aDatos masivos. 615 7$aSistemas de comunicaciones móviles$xMedidas de seguridad. 676 $a005.8 700 $aVan Till$b Steve$0866179 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910583384803321 996 $aThe five technological forces disrupting security$91933218 997 $aUNINA LEADER 01558oam 2200409 450 001 9910706178203321 005 20171226134452.0 035 $a(CKB)5470000002454643 035 $a(OCoLC)1017097645 035 $a(EXLCZ)995470000002454643 100 $a20171226j201708 ua 0 101 0 $aeng 135 $aurmn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aEconomic sensitivity and risk analysis for small-scale wood pellet systems--an example from southeast Alaska /$fDavid L. Nicholls 210 1$aPortland, OR :$cU.S. Department of Agriculture, Pacific Northwest Research Station,$dAugust 2017. 215 $a1 online resource (19 pages) $cillustrations (some color) 225 1 $aGeneral technical report PNW ;$vGTR-959 300 $a"August 2017." 320 $aIncludes bibliographical references (pages 16-19). 606 $aWood pellets$xEconomic aspects$zAlaska 606 $aFuelwood$xEconomic aspects$zAlaska 606 $aStoves, Wood$xEconomic aspects$zAlaska 615 0$aWood pellets$xEconomic aspects 615 0$aFuelwood$xEconomic aspects 615 0$aStoves, Wood$xEconomic aspects 700 $aNicholls$b David L.$091445 712 02$aPacific Northwest Research Station (Portland, Or.), 801 0$bGPO 801 1$bGPO 801 2$bGPO 906 $aBOOK 912 $a9910706178203321 996 $aEconomic sensitivity and risk analysis for small-scale wood pellet systems--an example from southeast Alaska$93448972 997 $aUNINA