Managing risk and security in outsourcing IT services onshore, offshore and the Cloud

Covering onshore, offshore, and cloud services, this book provides concrete examples and illustrative case studies that describe the specifics of what to do and what not to do across a variety of implementation scenarios. This book will be especially helpful to managers challenged with an outsourcin...

Full description

Bibliographic Details
Main Author: Siepmann, Frank
Format: eBook
Language:English
Published: Boca Raton, FL CRC Press 2014
Series:Information security books
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 03095nmm a2200565 u 4500
001 EB001932895
003 EBX01000000000000001095797
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 1439879109 
020 |a 9781439879108 
050 4 |a HD30.2 
100 1 |a Siepmann, Frank 
245 0 0 |a Managing risk and security in outsourcing IT services  |b onshore, offshore and the Cloud  |c Frank Siepmann, CISM, CISSP, ISSAP, NSA-IAM, NSA-IEM. 
260 |a Boca Raton, FL  |b CRC Press  |c 2014 
300 |a 1 online resource  |b text file, PDF 
505 0 |a Includes bibliographical references and index 
505 0 |a Chapter 1. Outsourcing -- chapter 2. The Cloud -- chapter 3. Before you decide to outsource -- chapter 4. Ready to outsource -- chapter 5. Day one and beyond -- chapter 6. When we part -- chapter 7. Outsourcing anecdotes 
653 |a risk assessment / aat 
653 |a BUSINESS & ECONOMICS / Management Science / bisacsh 
653 |a BUSINESS & ECONOMICS / Management / bisacsh 
653 |a BUSINESS & ECONOMICS / Organizational Behavior / bisacsh 
653 |a Évaluation du risque 
653 |a Offshore outsourcing / http://id.loc.gov/authorities/subjects/sh2005002955 
653 |a Risk assessment / http://id.loc.gov/authorities/subjects/sh87002638 
653 |a Risk Assessment 
653 |a Risk assessment / fast 
653 |a BUSINESS & ECONOMICS / Industrial Management / bisacsh 
653 |a Impartition à l'étranger 
653 |a Offshore outsourcing / fast 
653 |a Information technology / Contracting out / http://id.loc.gov/authorities/subjects/sh2011001032 
653 |a Information technology / Contracting out / fast 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
490 0 |a Information security books 
015 |a GBB3A1648 
776 |z 1439879109 
776 |z 9781439879108 
776 |z 1439879095 
776 |z 9781439879092 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781439879108/?ar  |x Verlag  |3 Volltext 
082 0 |a 658 
082 0 |a 658.4038 
082 0 |a 500 
082 0 |a 302.3 
082 0 |a 670 
082 0 |a 300 
082 0 |a 330 
520 |a Covering onshore, offshore, and cloud services, this book provides concrete examples and illustrative case studies that describe the specifics of what to do and what not to do across a variety of implementation scenarios. This book will be especially helpful to managers challenged with an outsourcing situation -- whether preparing for it, living it day to day, or being tasked to safely bring back information systems to the organization. This book not only provides the technical background required, but also the practical information about outsourcing and its mechanics. By describing and analyzing outsourcing industry processes and technologies, along with their security and privacy impacts, this book provides the fundamental understanding and guidance you need to keep your information, processes, and people secure when IT services are outsourced