Managing IT Service Security [electronic resource] : Methods and Recipes for User Organizations and Providers Along the Supply Chain / by Eberhard von Faber.

Por: von Faber, Eberhard [author.]Colaborador(es): SpringerLink (Online service)Tipo de material: TextoTextoEditor: Cham : Springer Nature Switzerland : Imprint: Springer, 2024Edición: 1st ed. 2024Descripción: XII, 172 p. online resourceTipo de contenido: text Tipo de medio: computer Tipo de portador: online resourceISBN: 9783031555336Tema(s): Software engineering -- Management | Data protection | Business logistics | Software Management | Security Services | Supply Chain ManagementFormatos físicos adicionales: Printed edition:: Sin título; Printed edition:: Sin títuloClasificación CDD: 005.1068 Clasificación LoC:QA76.758Recursos en línea: Libro electrónicoTexto
Contenidos:
Preface. -The Environment. - The Metasystem. - Assurance Management. - Taxonomy -- Document and Library Structure. - Secured by Definition. - Supply-Chain Relationship Management. - Cyber-Physical Systems (IoT and OT). - Perception, Knowledge, Competencies. - References -- Index.
En: Springer Nature eBookResumen: This book is about managing the security of IT services in terms of organization, orchestration, and optimization. It compresses the complex subject matter into individual terms and their definition, and it exploits systematics and terminology to create order, illuminate relationships, and provide concrete support for implementing IT service security successfully and with an eye for the essentials. The book describes a management system called ESARIS (Enterprise Security Architecture for Reliable ICT Services) with field-proven methods and recipes. This metasystem or security architecture builds on more than a decade of day-to-day experience in the IT industry with multi-national customers. To enable the reader to fully exploit the guidance given, explicit definitions are provided for about 75 terms that can be used to look up a topic. Numerous figures and tables further support orientation and understanding, together with detailed introductions and explanations they offer a comprehensive presentation of IT service security issues and solutions. This book is written for professionals with IT service providers (including IT departments), user organizations (including business units) or manufacturers, vendors, and suppliers.
Star ratings
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Electrónico Biblioteca Electrónica
Colección de Libros Electrónicos 1 No para préstamo

Preface. -The Environment. - The Metasystem. - Assurance Management. - Taxonomy -- Document and Library Structure. - Secured by Definition. - Supply-Chain Relationship Management. - Cyber-Physical Systems (IoT and OT). - Perception, Knowledge, Competencies. - References -- Index.

This book is about managing the security of IT services in terms of organization, orchestration, and optimization. It compresses the complex subject matter into individual terms and their definition, and it exploits systematics and terminology to create order, illuminate relationships, and provide concrete support for implementing IT service security successfully and with an eye for the essentials. The book describes a management system called ESARIS (Enterprise Security Architecture for Reliable ICT Services) with field-proven methods and recipes. This metasystem or security architecture builds on more than a decade of day-to-day experience in the IT industry with multi-national customers. To enable the reader to fully exploit the guidance given, explicit definitions are provided for about 75 terms that can be used to look up a topic. Numerous figures and tables further support orientation and understanding, together with detailed introductions and explanations they offer a comprehensive presentation of IT service security issues and solutions. This book is written for professionals with IT service providers (including IT departments), user organizations (including business units) or manufacturers, vendors, and suppliers.

UABC ; Perpetuidad

Con tecnología Koha