Add to Book Shelf
Flag as Inappropriate
Email this Book

Managing Your Return on Investment (Roi) for Public Key Infrastructure (Pki) Security in the Digital Future

By Butziger, Peter J.

Click here to view

Book Id: WPLBN0000698934
Format Type: PDF eBook:
File Size: 2.79 MB
Reproduction Date: 2005

Title: Managing Your Return on Investment (Roi) for Public Key Infrastructure (Pki) Security in the Digital Future  
Author: Butziger, Peter J.
Volume:
Language: English
Subject: Technology., Reference materials, Technology and literature
Collections: Techonology eBook Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

J. Butzige, B. P. (n.d.). Managing Your Return on Investment (Roi) for Public Key Infrastructure (Pki) Security in the Digital Future. Retrieved from http://gutenberg.us/


Description
Technical Reference Publication

Excerpt
Excerpt: The digital future holds unprecedented convenience and efficiency of data access. However security remains one of the most limiting growth factors across all industries. These security concerns include: confidentiality of connectivity (internet and beyond), application of digital signatures in paperless environments, single sign-on authentication, and evolving court cases of hacker damage and corporate liability. What are IT professional expected to do when the demands are to do more with less money, time, and resources? The evolving answer to all of these security concerns is an investment in a security foundation called Public Key Infrastructure (PKI). Many people have been playing with this technology within the internet and email worlds for years and new vendors are showing up by the dozens to get a share of this explosive and promising security market. However, it still seems to be missing the mark for corporate Information Technology decision-makers. Where is the Return on Investment (ROI).

Table of Contents
Table of Contents.................................................................................................................................ii Refereed Papers Next Generation Intrusion Detection: Autonomous Reinforcement ...........................File Size: 90 K Learning of Network Attacks James Cannady, Georgia Institute of Technology Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection..........File Size: 113 K Susan M. Bridges & Rayford B. Vaughn, Mississippi State University

 
 



Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.