Managing IT Service Security (Record no. 88077)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03315nam a22005055i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-031-55533-6 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730172159.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240527s2024 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783031555336 |
-- | 978-3-031-55533-6 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.1068 |
100 1# - AUTHOR NAME | |
Author | von Faber, Eberhard. |
245 10 - TITLE STATEMENT | |
Title | Managing IT Service Security |
Sub Title | Methods and Recipes for User Organizations and Providers Along the Supply Chain / |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2024. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XII, 172 p. |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Preface. -The Environment. - The Metasystem. - Assurance Management. - Taxonomy -- Document and Library Structure. - Secured by Definition. - Supply-Chain Relationship Management. - Cyber-Physical Systems (IoT and OT). - Perception, Knowledge, Competencies. - References -- Index. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book is about managing the security of IT services in terms of organization, orchestration, and optimization. It compresses the complex subject matter into individual terms and their definition, and it exploits systematics and terminology to create order, illuminate relationships, and provide concrete support for implementing IT service security successfully and with an eye for the essentials. The book describes a management system called ESARIS (Enterprise Security Architecture for Reliable ICT Services) with field-proven methods and recipes. This metasystem or security architecture builds on more than a decade of day-to-day experience in the IT industry with multi-national customers. To enable the reader to fully exploit the guidance given, explicit definitions are provided for about 75 terms that can be used to look up a topic. Numerous figures and tables further support orientation and understanding, together with detailed introductions and explanations they offer a comprehensive presentation of IT service security issues and solutions. This book is written for professionals with IT service providers (including IT departments), user organizations (including business units) or manufacturers, vendors, and suppliers. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Management. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-3-031-55533-6 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer Nature Switzerland : |
-- | Imprint: Springer, |
-- | 2024. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Software engineering |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Business logistics. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Software Management. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Security Services. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Supply Chain Management. |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
No items available.