LEADER 05284nam 2200661 a 450 001 9910140870303321 005 20230725025756.0 010 $a1-282-94413-4 010 $a9786612944130 010 $a1-118-25580-1 010 $a1-118-00831-6 010 $a1-118-00833-2 035 $a(CKB)2670000000061027 035 $a(EBL)694289 035 $a(OCoLC)732958481 035 $a(SSID)ssj0000475455 035 $a(PQKBManifestationID)11304147 035 $a(PQKBTitleCode)TC0000475455 035 $a(PQKBWorkID)10480403 035 $a(PQKB)10604090 035 $a(MiAaPQ)EBC694289 035 $a(Au-PeEL)EBL694289 035 $a(CaPaEBR)ebr10469690 035 $a(CaONFJC)MIL294413 035 $a(EXLCZ)992670000000061027 100 $a20100713d2011 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity 2020$b[electronic resource] $ereduce security risks this decade /$fDoug Howard and Kevin Prince 205 $a1st ed. 210 $aIndianapolis, Ind. $cWiley Pub.$dc2011 215 $a1 online resource (338 p.) 300 $aIncludes index. 311 $a0-470-63955-5 327 $aSecurity 2020; Contents; Foreword; Introduction; Chapter 1 What Has History Shown Us?; The History of Data Breach Disclosure; The History of Vulnerability Exploits; The History of Viruses and Worms; The History of Edge-Based Security; The History of Patching; Hacker Methodologies; Inbound Attacks; The History of Malware; Automated Attacks; The History of Hacker Motivation; The History of Botnets; The History of Search Engine Hacking; The History of Data Loss; The History of Security Solutions; The Making of a Cyber-Super-Villain; The Botnet in Action; Hindsight is NOT 20/20 327 $aChapter 2 External Influences on Security Information Security Drivers; The Emotions; World Events; The Impact of Politics; The Impact on Journalism; The Social Engineer; GRC; Litigation; Breach Impact on Public Companies; The Security Culture; The Path to 2020; Chapter 3 Technology Influences on Security; The Movement Toward National Identity Management; Internet Protocol in 2020; 2020: Remote Access Continues to Be a Problem; The Search Engine Impact; The Web Services Impact; The Impact of Virtualization; The Malware Problem; The Web Browser; The Portable Media Debacle, A.K.A. Mobility 327 $aAdvanced Persistent Threat in 2020 The Network Edge; The Security Software Vendor; Personal Information and Data Correlation; The Domain Name; Chapter 4 Where Security Threats Will Come from in the Future; Spam; Botnets; The Ph-enomenon: Why so many attack methods start with "Ph"; Phishing, Pharming, SMSishing, Vishing; Vulnerability Exploits; Insider Threats; Mobility Threats; Infected Software; Peer-to-Peer (P2P) Software; Third-Party Threats; Social Networking Threats; Digitization; Star Wars; Infrastructure Attacks; Social and Financial Threats; Website Middleware Threats 327 $aDoppelganger Attacks Chapter 5 Secure Communications and Collaboration; Email, Instant Messaging, and SMS; Online Webinars and Collaboration Tools; Voice over IP; Video over IP; Storage and Retention of User-Generated Content; Digital Rights Management and Content Protection; Digital Rights Management; Watermarking; UCC and UCC Compliance Requirements over the Next Decade; Chapter 6 2020 Revolution or Evolution?; IT Security Revolution; The Missing Deterrent; Security in 20/20 Hindsight; Intrusion Detection Systems, Intrusion Protection Systems, and Data Loss Prevention in 20/20 Hindsight 327 $aIdentity Management/Network Access Control/Single Sign-on Mobility/Wireless/Ultra-Mobile; SaaS and Cloud Computing; Testing Your Information Protection: Penetration Test/Vulnerability Test/Risk Assessments; Chapter 7 Security as a Business Now and Then; The Purpose of IT; Evolving Purpose into Action; The Map to Success; The Relationship: Security and Luck; Security: An Industry or a Feature of IT?; Consolidation of the IT Security Industry; Buying Security: Defining the Value; Budgets and Prioritizations; Venture Capital and Investment in IT Security 327 $aChapter 8 Impact of the Economy over the Next 10 Years 330 $aIdentify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; 606 $aComputer security 606 $aComputer security$xForecasting 615 0$aComputer security. 615 0$aComputer security$xForecasting. 676 $a005.8 700 $aHoward$b Doug$0953462 701 $aPrince$b Kevin$0953463 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910140870303321 996 $aSecurity 2020$92155647 997 $aUNINA LEADER 04816nam 2200625 a 450 001 9910777344903321 005 20230216212857.0 010 $a0-313-07510-7 035 $a(CKB)1000000000002096 035 $a(EBL)3000707 035 $a(SSID)ssj0000137943 035 $a(PQKBManifestationID)11162965 035 $a(PQKBTitleCode)TC0000137943 035 $a(PQKBWorkID)10097080 035 $a(PQKB)10010259 035 $a(MiAaPQ)EBC3000707 035 $a(Au-PeEL)EBL3000707 035 $a(CaPaEBR)ebr10020815 035 $a(OCoLC)70765948 035 $a(EXLCZ)991000000000002096 100 $a20010109d2001 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aDevelopment of digital libraries $ean American perspective /$fedited by Deanna B. Marcum ; foreword by Kakugyo S. Chiku 210 1$aWestport, Conn. :$cGreenwood Press,$d2001. 215 $a1 online resource (xiii, 347 pages) 225 1 $aContributions in librarianship and information science,$x0084-9243 ;$vno. 95 300 $aPapers presented from 1994 to 1998 at the Kanazawa Institute of Technology (KIT) International Roundtable on Library and Information Science. 311 0 $a0-313-31478-0 320 $aIncludes bibliographical references and index. 327 $a""Contents""; ""Figures and Tables""; ""Foreword""; ""Preface""; ""PART I Perspectives on the Library in the Twenty- First Century""; ""CHAPTER 1 Scholarship, Information, and Libraries in the Electronic Age STANLEY CHODOROW""; ""CHAPTER 2 The Impact of Information Technologies on the Role of Research Libraries in Teaching and Learning in the United States ELAINE SLOAN""; ""CHAPTER 3 The Life of the Mind in a World Transformed by Networks and Digital Libraries PAUL EVAN PETERS""; ""CHAPTER 4 What's Happening to the Book? RICHARD A. LANHAM"" 327 $a""CHAPTER 5 The Impact of Digital Technology on Libraries: A Chaotic Revolution JERRY D. CAMPBELL""""CHAPTER 6 The Future Value of Digital Information and Digital Libraries MICHAEL LESK""; ""PART II Meeting the Challenges of the Digital Library""; ""CHAPTER 7 The Library as Provider of Digital Resources for Teaching and Scholarship ANN J. WOLPERT""; ""CHAPTER 8 Can We Afford Digital Information? Libraries? An Early Assessment of Economic Prospects for Digital Publications ANN B. OKERSON""; ""CHAPTER 9 Intellectual Property Policy for an Information Society PETER LYMAN"" 327 $a""CHAPTER 10 The Uses of Digital Libraries: Some Technological, Political, and Economic Considerations DONALD J. WATERS""""CHAPTER 11 Digital Preservation: An Update DEANNA B. MARCUM""; ""CHAPTER 12 The Impact of Digital Libraries on Library Staffing and Education RACHAEL K. ANDERSON""; ""CHAPTER 13 Government Records in a Digital World PETER B. HIRTLE""; ""CHAPTER 14 A View on the Ecology of Information BRIAN L. HAWKINS""; ""PART III The Digital Library in the Service of Research and Education: Some Experiences"" 327 $a""CHAPTER 15 The Library of Congress's National Digital Library: Reaching Out to Schools and Libraries through the Internet LAURA CAMPBELL""""CHAPTER 16 Toward Libraries' Digital Future: The Canadian Digital Library Experience LEIGH SWAIN AND SUSAN HAIGH""; ""CHAPTER 17 The Future of Libraries and Library Schools DANIEL E. ATKINS""; ""CHAPTER 18 Redefining the University through Educational and Information Technologies: North Carolina State University, Its Libraries, and Distance Education SUSAN K. NUTTER""; ""CHAPTER 19 Re- engineering the Undergraduate Curriculum JACK M. WILSON"" 327 $a""CHAPTER 20 The Internet Public Library: Development and Future JOSEPH W. JANES""""CHAPTER 21 Public Libraries in the United States: Service to Business and Industry BEVERLY P. LYNCH""; ""CHAPTER 22 Prognosis on Becoming Digital: Digital Information, Global Networks, and Business Education WILLIAM D. WALKER""; ""Index""; ""About the Contributors"" 410 0$aContributions in librarianship and information science ;$v95. 606 $aDigital libraries$zUnited States$vCongresses 606 $aDigital libraries$vCongresses 606 $aLibraries$xSpecial collections$xElectronic information resources$vCongresses 615 0$aDigital libraries 615 0$aDigital libraries 615 0$aLibraries$xSpecial collections$xElectronic information resources 676 $a025/.00285 701 $aMarcum$b Deanna B$01485558 712 12$aKanazawa Institute of Technology International Roundtable on Library and Information Science. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910777344903321 996 $aDevelopment of digital libraries$93704758 997 $aUNINA