Managing IT Service Security [electronic resource] : Methods and Recipes for User Organizations and Providers Along the Supply Chain / by Eberhard von Faber.
By: von Faber, Eberhard [author.].
Contributor(s): SpringerLink (Online service).
Material type: BookPublisher: Cham : Springer Nature Switzerland : Imprint: Springer, 2024Edition: 1st ed. 2024.Description: XII, 172 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783031555336.Subject(s): Software engineering -- Management | Data protection | Business logistics | Software Management | Security Services | Supply Chain ManagementAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.1068 Online resources: Click here to access onlinePreface. -The Environment. - The Metasystem. - Assurance Management. - Taxonomy -- Document and Library Structure. - Secured by Definition. - Supply-Chain Relationship Management. - Cyber-Physical Systems (IoT and OT). - Perception, Knowledge, Competencies. - References -- Index.
This book is about managing the security of IT services in terms of organization, orchestration, and optimization. It compresses the complex subject matter into individual terms and their definition, and it exploits systematics and terminology to create order, illuminate relationships, and provide concrete support for implementing IT service security successfully and with an eye for the essentials. The book describes a management system called ESARIS (Enterprise Security Architecture for Reliable ICT Services) with field-proven methods and recipes. This metasystem or security architecture builds on more than a decade of day-to-day experience in the IT industry with multi-national customers. To enable the reader to fully exploit the guidance given, explicit definitions are provided for about 75 terms that can be used to look up a topic. Numerous figures and tables further support orientation and understanding, together with detailed introductions and explanations they offer a comprehensive presentation of IT service security issues and solutions. This book is written for professionals with IT service providers (including IT departments), user organizations (including business units) or manufacturers, vendors, and suppliers.
There are no comments for this item.