Managing IT Service Security (Record no. 88077)

000 -LEADER
fixed length control field 03315nam a22005055i 4500
001 - CONTROL NUMBER
control field 978-3-031-55533-6
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730172159.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240527s2024 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783031555336
-- 978-3-031-55533-6
082 04 - CLASSIFICATION NUMBER
Call Number 005.1068
100 1# - AUTHOR NAME
Author von Faber, Eberhard.
245 10 - TITLE STATEMENT
Title Managing IT Service Security
Sub Title Methods and Recipes for User Organizations and Providers Along the Supply Chain /
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2024.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XII, 172 p.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Preface. -The Environment. - The Metasystem. - Assurance Management. - Taxonomy -- Document and Library Structure. - Secured by Definition. - Supply-Chain Relationship Management. - Cyber-Physical Systems (IoT and OT). - Perception, Knowledge, Competencies. - References -- Index.
520 ## - SUMMARY, ETC.
Summary, etc This book is about managing the security of IT services in terms of organization, orchestration, and optimization. It compresses the complex subject matter into individual terms and their definition, and it exploits systematics and terminology to create order, illuminate relationships, and provide concrete support for implementing IT service security successfully and with an eye for the essentials. The book describes a management system called ESARIS (Enterprise Security Architecture for Reliable ICT Services) with field-proven methods and recipes. This metasystem or security architecture builds on more than a decade of day-to-day experience in the IT industry with multi-national customers. To enable the reader to fully exploit the guidance given, explicit definitions are provided for about 75 terms that can be used to look up a topic. Numerous figures and tables further support orientation and understanding, together with detailed introductions and explanations they offer a comprehensive presentation of IT service security issues and solutions. This book is written for professionals with IT service providers (including IT departments), user organizations (including business units) or manufacturers, vendors, and suppliers.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Management.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-031-55533-6
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer Nature Switzerland :
-- Imprint: Springer,
-- 2024.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Software engineering
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Business logistics.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Software Management.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Security Services.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Supply Chain Management.
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS

No items available.