Statelessness
- 392 pages
- 14 hours of reading
In this powerfully argued book, Conklin critically evaluates traditional efforts to recognise and reduce statelessness.


In this powerfully argued book, Conklin critically evaluates traditional efforts to recognise and reduce statelessness.
Part I: Enterprise Security§Chapter 1: Cryptographic Tools§Chapter 2: Computing Platforms§Chapter 3: Enterprise Storage§Chapter 4: Infrastructure§Chapter 5: Host Security Controls§Chapter 6: Application Security§Chapter 7: Security Assessments§Part II: Risk Management, Policy/Procedure, and Legal§Chapter 8: Analyze Risk Implications§Chapter 9: Risk Management Strategy and Controls§Chapter 10: E-discovery, Data Breaches and Incident Response§Chapter 11: Security and Privacy Policies§Part III: Research and Analysis§Chapter 12: Industry Trends§Chapter 13: Enterprise Security§Part IV: Integration of Computing, Communications and Business Disciplines§Chapter 14: People and Security§Chapter 15: Change Control§Chapter 16: Security Controls for Communication and Collaboration§Chapter 17: Advanced Authentication Tools, Techniques and Concepts§Chapter 18: Security Activities Across the Technology Life Cycle§Appendix A: About the CD-ROM§Glossary§