Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000ngm a22003731i 4500 
003    CaSfKAN 
005    20140204133419.0 
006    m     o  c         
007    vz uzazuu 
007    cr una---unuuu 
008    140807p20142012cau036        o   vleng d 
028 52 1089901|bKanopy 
035    (OCoLC)897769728 
040    UtOrBLW|beng|erda|cUtOrBLW 
245 00 Enterprise security landscape.|h[Kanopy electronic 
       resource] 
264  1 [San Francisco, California, USA] :|bKanopy Streaming,
       |c2014. 
300    1 online resource (1 video file, approximately 36 min.) :
       |bdigital, .flv file, sound 
336    two-dimensional moving image|2rdacontent 
337    computer|2rdamedia 
338    online resource|2rdacarrier 
344    digital 
347    video file|bMPEG-4|bFlash 
500    Title from title frames. 
518    Originally produced by SmartPros in 2012. 
520    Hackers around the globe are relentless in their attempts 
       to access networks and devices in order to steal 
       information or plant malicious programs. IT security 
       professionals are in a constant tug-of-war with these 
       actors defending enterprise systems and data from 
       unauthorized access and cyber-attack. In this report Jack 
       Danahy, Director of Advanced Security at IBM, discusses 
       the current enterprise security landscape and offers 
       advice and best practices that will help IT and business 
       professionals protect sensitive data and assets from a 
       damaging cyber-attack. Track: Straight talk 
       straightforward explanations of key technologies and their
       business value. Learning objectives: Explain the changing 
       nature of security threats and cyber-attacks. Recognize if
       enterprises are "up to the challenge" in terms of 
       protecting their infrastructure and data from security 
       breaches and cyber-attack. Understand the emerging IT 
       trends of cloud computing and big data and how they impact
       enterprise security. 
538    Mode of access: World Wide Web. 
650  0 Computer hackers. 
650  0 Cyberterrorism. 
650  0 Cloud computing. 
650  0 Big data. 
710 2  Kanopy (Firm) 
856 40 |uhttps://naperville.kanopy.com/node/89902|zAvailable on 
       Kanopy 
856 42 |zCover Image|uhttps://www.kanopy.com/node/89902/external-
       image