資料來源: Google Book
Outsourcing information security
- 作者: Axelrod, C. Warren.
- 出版: Boston : Artech House ©2004.
- 稽核項: 1 online resource (xxvi, 248 pages) :illustrations.
- 叢書名: Artech House computer security series
- 標題: SécuritéMesures , Réseaux d'ordinateurs , COMPUTERS , Réseaux d'ordinateurs Sécurité -- Mesures -- États-Unis. , Computer networks Computer networks -- Security measures -- United States. , AccèsContrôle , Electronic book. , Computers Access control. , Ordinateurs , Ordinateurs Accès -- Contrôle -- États-Unis. , Chiffrement (Informatique) , COMPUTERS Internet -- Security. , Computer networksSecurity measures , Computers , Computers Access control -- United States. , SecurityGeneral. , COMPUTERS Networking -- Security. , Electronic books. , Access control. , Réseaux d'ordinateurs Réseaux d'ordinateurs -- Sécurité -- Mesures -- États-Unis. , United States. , Access control , Computer networks , Computer networks Security measures -- United States. , InternetSecurity. , Security measures , Réseaux d'ordinateursSécuritéMesures , Data encryption (Computer science) , NetworkingSecurity. , COMPUTERS Security -- General.
- ISBN: 1580535313 , 9781580535311
- 試查全文@TNUA:
- 附註: Includes bibliographical references (pages 209-233) and index.
- 摘要: This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.
- 電子資源: https://dbs.tnua.edu.tw/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=121780
- 系統號: 005311993
- 資料類型: 電子書
- 讀者標籤: 需登入
- 引用網址: 複製連結
This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions. Moreover, it enables you to determine which information security functions should be performed by a third party, better manage third-party relationships, and ensure that any functions handed over to a third party meet good security standards.
來源: Google Book
來源: Google Book
評分