World Library  


Add to Book Shelf
Flag as Inappropriate
Email this Book

Managing Your Return on Investment (Roi) for Public Key Infrastructure (Pki) Security in the Digital Future

By Butziger, Peter J.

Click here to view

Book Id: WPLBN0000698934
Format Type: PDF eBook
File Size: 2.66 MB.
Reproduction Date: 2005
Full Text

Title: Managing Your Return on Investment (Roi) for Public Key Infrastructure (Pki) Security in the Digital Future  
Author: Butziger, Peter J.
Volume:
Language: English
Subject: Technology., Reference materials, Technology and literature
Collections: Techonology eBook Collection
Historic
Publication Date:
Publisher:

Description
Technical Reference Publication

Excerpt
Excerpt: The digital future holds unprecedented convenience and efficiency of data access. However security remains one of the most limiting growth factors across all industries. These security concerns include: confidentiality of connectivity (internet and beyond), application of digital signatures in paperless environments, single sign-on authentication, and evolving court cases of hacker damage and corporate liability. What are IT professional expected to do when the demands are to do more with less money, time, and resources? The evolving answer to all of these security concerns is an investment in a security foundation called Public Key Infrastructure (PKI). Many people have been playing with this technology within the internet and email worlds for years and new vendors are showing up by the dozens to get a share of this explosive and promising security market. However, it still seems to be missing the mark for corporate Information Technology decision-makers. Where is the Return on Investment (ROI).

Table of Contents
Table of Contents.................................................................................................................................ii Refereed Papers Next Generation Intrusion Detection: Autonomous Reinforcement ...........................File Size: 90 K Learning of Network Attacks James Cannady, Georgia Institute of Technology Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection..........File Size: 113 K Susan M. Bridges & Rayford B. Vaughn, Mississippi State University

 

Click To View

Additional Books


  • Evaluated Kinetic and Photochemical Data... (by )
  • Toward Next-Generation Construction Mach... (by )
  • Reporting 
  • Secure Cyberspace 
  • Thermodynamic Properties of Dioxygen Dif... (by )
  • Thermodynamic Functions and Properties o... (by )
  • Cross Sections and Related Data for Elec... (by )
  • Cross Sections and Swarm Coefficients fo... (by )
  • Administrative Modifications 
  • Indefinite Delivery Indefinite Quantity ... 
  • Credit Card Purchases 
  • Awards 
Scroll Left
Scroll Right

 



Copyright © World Library Foundation. All rights reserved. eBooks from Cloud eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.