|
|
|
|
LEADER |
03095nmm a2200565 u 4500 |
001 |
EB001932895 |
003 |
EBX01000000000000001095797 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 1439879109
|
020 |
|
|
|a 9781439879108
|
050 |
|
4 |
|a HD30.2
|
100 |
1 |
|
|a Siepmann, Frank
|
245 |
0 |
0 |
|a Managing risk and security in outsourcing IT services
|b onshore, offshore and the Cloud
|c Frank Siepmann, CISM, CISSP, ISSAP, NSA-IAM, NSA-IEM.
|
260 |
|
|
|a Boca Raton, FL
|b CRC Press
|c 2014
|
300 |
|
|
|a 1 online resource
|b text file, PDF
|
505 |
0 |
|
|a Includes bibliographical references and index
|
505 |
0 |
|
|a Chapter 1. Outsourcing -- chapter 2. The Cloud -- chapter 3. Before you decide to outsource -- chapter 4. Ready to outsource -- chapter 5. Day one and beyond -- chapter 6. When we part -- chapter 7. Outsourcing anecdotes
|
653 |
|
|
|a risk assessment / aat
|
653 |
|
|
|a BUSINESS & ECONOMICS / Management Science / bisacsh
|
653 |
|
|
|a BUSINESS & ECONOMICS / Management / bisacsh
|
653 |
|
|
|a BUSINESS & ECONOMICS / Organizational Behavior / bisacsh
|
653 |
|
|
|a Évaluation du risque
|
653 |
|
|
|a Offshore outsourcing / http://id.loc.gov/authorities/subjects/sh2005002955
|
653 |
|
|
|a Risk assessment / http://id.loc.gov/authorities/subjects/sh87002638
|
653 |
|
|
|a Risk Assessment
|
653 |
|
|
|a Risk assessment / fast
|
653 |
|
|
|a BUSINESS & ECONOMICS / Industrial Management / bisacsh
|
653 |
|
|
|a Impartition à l'étranger
|
653 |
|
|
|a Offshore outsourcing / fast
|
653 |
|
|
|a Information technology / Contracting out / http://id.loc.gov/authorities/subjects/sh2011001032
|
653 |
|
|
|a Information technology / Contracting out / fast
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
490 |
0 |
|
|a Information security books
|
015 |
|
|
|a GBB3A1648
|
776 |
|
|
|z 1439879109
|
776 |
|
|
|z 9781439879108
|
776 |
|
|
|z 1439879095
|
776 |
|
|
|z 9781439879092
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781439879108/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 658
|
082 |
0 |
|
|a 658.4038
|
082 |
0 |
|
|a 500
|
082 |
0 |
|
|a 302.3
|
082 |
0 |
|
|a 670
|
082 |
0 |
|
|a 300
|
082 |
0 |
|
|a 330
|
520 |
|
|
|a Covering onshore, offshore, and cloud services, this book provides concrete examples and illustrative case studies that describe the specifics of what to do and what not to do across a variety of implementation scenarios. This book will be especially helpful to managers challenged with an outsourcing situation -- whether preparing for it, living it day to day, or being tasked to safely bring back information systems to the organization. This book not only provides the technical background required, but also the practical information about outsourcing and its mechanics. By describing and analyzing outsourcing industry processes and technologies, along with their security and privacy impacts, this book provides the fundamental understanding and guidance you need to keep your information, processes, and people secure when IT services are outsourced
|