The Five Technological Forces Disrupting Security: How Social, Mobile, Cloud and IoT are Fundamentally Changing the Practice of Physical Security

The Five Technological Forces Disrupting Security: How Social, Mobile, Cloud and IoT are Fundamentally Changing the Practice of Physical Security

Van Till, Steve

56,11 €(IVA inc.)

The Five Technological Forces Disrupting Security: How Social, Mobile, Cloud and IoT are Fundamentally Changing the Practice of Physical Security explores the major technological forces that are currently disrupting the security industry and what is coming in the foreseeable future. The book provides both practical guidance on how to use the new technologies to deliver better solutions to customers, along with a high level perspective on how the industry is changing as a whole. It answers key questions on how new entrants in the field are apt to change market dynamics and affect customer choices and existing players. In addition, the book presents valuable perspectives on the direction that product management, or product representation, should take over the next several years, also outlining guidelines for maintaining relevant careers skills. It is a great resource for both the seasoned professional and those early in their careers who are looking to maximize their knowledge. Examines, in-depth, the five major technological forces driving the industry from the IT side, with particular focus on how they are interrelatedExplains how companies can improve their security infrastructure through incorporating technologies (cloud, mobile, data, Internet of Things, and social spaces) into their products, people, and processesInstructs practitioners on how to position their businesses or careers for the technological changes that are disrupting the physical security industry INDICE: Section 1: Cloud 1.  A Brief History of the Cloud It all started with IP 2. The Runup to Cloud 3. Turning the Titanic Why Would it Turn? 4. New Entrants 5. Transformation Economics Section 2: Mobile 6. There's an App for That The App Explosion 7. Situational Awareness 8. My Phone, my Identity Say Goodbye to Cards 9. Presence Presence Becomes Possible Section 3: IoT 10. Why IoT Matters to Security It's All About the Data 11. Everything is a Sensor 12. IoT Has a Job to Do Monitoring 13. All Security Will Be Cyber Security Device Authentication & Security 14. IoT Models for Physical Security IoT in the Real World Section 4: Big Data 15. What is Big Data? 16. What can it do for security? 17. How will it be used? 18. Privacy Section 5: Social Spaces 19. Intro Chapter Social Saves Lives 20. Sign-On What is social sign on? Why do we need it? 21. Identity 22. Communication 23. Crowdsourcing Many Eyes, Many Observers Communities of Interest Watching the 24. Trust Section 6: Five Forces in Five Years 25. Unification 27. Channel 28. Outside Influences Computing Power Bandwidth 29. 'Driverless Security' 30. Winners and Losers

  • ISBN: 978-0-12-805095-8
  • Editorial: Butterworth-Heinemann
  • Encuadernacion: Rústica
  • Páginas: 352
  • Fecha Publicación: 01/10/2017
  • Nº Volúmenes: 1
  • Idioma: Inglés