|
|
|
|
LEADER |
00000cam a22000004a 4500 |
001 |
EBSCO_ocm56985843 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
041117s2004 maua ob 001 0 eng d |
010 |
|
|
|z 2004052956
|
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCLCQ
|d YDXCP
|d OCLCQ
|d EXW
|d OCLCQ
|d B24X7
|d OCLCQ
|d OCLCO
|d OCLCQ
|d DKDLA
|d NLGGC
|d OCLCO
|d MERUC
|d CCO
|d E7B
|d NTG
|d BMU
|d REDDC
|d EBLCP
|d QT5
|d MHW
|d OCLCF
|d DEBSZ
|d FVL
|d OCLCQ
|d AZK
|d LOA
|d JBG
|d CNNOR
|d AGLDB
|d MOR
|d PIFBR
|d ZCU
|d LIV
|d OCLCQ
|d SAV
|d OCLCQ
|d WY@
|d U3W
|d LUE
|d STF
|d OCL
|d BRL
|d WRM
|d VTS
|d NRAMU
|d ICG
|d INT
|d VT2
|d TOF
|d OCLCQ
|d AU@
|d COO
|d WYU
|d A6Q
|d OCLCQ
|d G3B
|d DKC
|d OCLCQ
|d M8D
|d UKAHL
|d OCLCQ
|d CHBRC
|d OCLCQ
|d UKCRE
|d OCLCO
|d OCL
|d OCLCQ
|
015 |
|
|
|a GBA462322.
|2 bnb
|
019 |
|
|
|a 62793082
|a 70739803
|a 123129289
|a 475185701
|a 488558085
|a 531340097
|a 559837668
|a 630215022
|a 646733168
|a 722363454
|a 728028004
|a 888724495
|a 961579756
|a 962652704
|a 966231845
|a 988440311
|a 991982635
|a 992062027
|a 1037508783
|a 1038595599
|a 1045506745
|a 1053052986
|a 1055390601
|a 1058094364
|a 1064105177
|a 1076314204
|a 1081233258
|a 1135388351
|a 1153475313
|
020 |
|
|
|a 1580539556
|q (electronic bk.)
|
020 |
|
|
|a 9781580539555
|q (electronic bk.)
|
020 |
|
|
|a 9781580535311
|q (alk. paper)
|
020 |
|
|
|a 1580535313
|q (alk. paper)
|
029 |
1 |
|
|a AU@
|b 000051400484
|
029 |
1 |
|
|a AU@
|b 000053244613
|
029 |
1 |
|
|a AU@
|b 000062547225
|
029 |
1 |
|
|a DEBBG
|b BV043107303
|
029 |
1 |
|
|a DEBBG
|b BV044080339
|
029 |
1 |
|
|a DEBSZ
|b 396064116
|
029 |
1 |
|
|a DEBSZ
|b 422350370
|
029 |
1 |
|
|a GBVCP
|b 801214947
|
029 |
1 |
|
|a NZ1
|b 12021492
|
035 |
|
|
|a (OCoLC)56985843
|z (OCoLC)62793082
|z (OCoLC)70739803
|z (OCoLC)123129289
|z (OCoLC)475185701
|z (OCoLC)488558085
|z (OCoLC)531340097
|z (OCoLC)559837668
|z (OCoLC)630215022
|z (OCoLC)646733168
|z (OCoLC)722363454
|z (OCoLC)728028004
|z (OCoLC)888724495
|z (OCoLC)961579756
|z (OCoLC)962652704
|z (OCoLC)966231845
|z (OCoLC)988440311
|z (OCoLC)991982635
|z (OCoLC)992062027
|z (OCoLC)1037508783
|z (OCoLC)1038595599
|z (OCoLC)1045506745
|z (OCoLC)1053052986
|z (OCoLC)1055390601
|z (OCoLC)1058094364
|z (OCoLC)1064105177
|z (OCoLC)1076314204
|z (OCoLC)1081233258
|z (OCoLC)1135388351
|z (OCoLC)1153475313
|
043 |
|
|
|a n-us---
|
050 |
|
4 |
|a QA76.9.A25
|b A88 2004eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Axelrod, C. Warren.
|
245 |
1 |
0 |
|a Outsourcing information security /
|c C. Warren Axelrod.
|
260 |
|
|
|a Boston :
|b Artech House,
|c ©2004.
|
300 |
|
|
|a 1 online resource (xxvi, 248 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|2 rda
|
490 |
1 |
|
|a Artech House computer security series
|
504 |
|
|
|a Includes bibliographical references (pages 209-233) and index.
|
505 |
0 |
0 |
|t Outsourcing and Information Security --
|t Y2K as a Turning Point --
|t The Post Y2K Outsourcing Speed Bump --
|t Shaky Managed Security Services Providers --
|t A Prognosis --
|t The Information Security Market --
|t Information Security Risks --
|t Threats --
|t From Internal Source --
|t From External Sources --
|t Review of Threats --
|t Vulnerabilities --
|t Computer Systems and Networks --
|t Software Development --
|t Systemic Risks --
|t Operational Risk --
|t Operator and Administrator Risk --
|t Complexity Risk --
|t Life-Cycle Risk --
|t Risks of Obsolescence --
|t Vendor Viability Risk --
|t Risk of Poor Quality Support --
|t Conversion Risk --
|t Risk of Dependency on Key Individuals --
|t Justifying Outsourcing --
|t Professed Reasons to Outsource --
|t The Basis for Decision --
|t Reasons for Considering Outsourcing --
|t Cost Savings --
|t Performance --
|t Security --
|t Expertise --
|t Computer Applications --
|t Support --
|t Financial Arrangements --
|t The Other Side of the Outsourcing Decision --
|t Risks of Outsourcing --
|t Loss of Control --
|t Viability of Service Providers --
|t Reasons for Abandoning Service --
|t Relative Size of Customer --
|t Quality of Service --
|t Tangibles --
|t Reliability --
|t Responsiveness --
|t Assurance --
|t Empathy --
|t The Issue of Trust --
|t Performance of Applications and Services --
|t Lack of Expertise --
|t Hidden and Uncertain Costs --
|t Limited Customization and Enhancements --
|t Knowledge Transfer --
|t Shared Environments --
|t Legal and Regulatory Matters --
|t Categorizing Costs and Benefits --
|t Structured, Unbiased Analysis--The Ideal --
|t Costs and Benefits.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer networks
|x Computer networks
|x Security measures
|z United States.
|
650 |
|
0 |
|a Computers
|x Access control
|z United States.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Computer networks
|x Security measures
|z United States.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|z États-Unis.
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle
|z États-Unis.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|z États-Unis.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computers
|x Access control.
|2 fast
|0 (OCoLC)fst00872779
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|0 (OCoLC)fst00887935
|
651 |
|
7 |
|a United States.
|2 fast
|0 (OCoLC)fst01204155
|
776 |
0 |
8 |
|i Print version:
|a Axelrod, C. Warren.
|t Outsourcing information security.
|d Boston : Artech House, ©2004
|z 1580535313
|w (DLC) 2004052956
|w (OCoLC)56420389
|
830 |
|
0 |
|a Artech House computer security series.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=121780
|z Texto completo
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2358767
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 121780
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10081998
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL227659
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00004371
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH20050153
|
938 |
|
|
|a IEEE
|b IEEE
|n 9100558
|
994 |
|
|
|a 92
|b IZTAP
|