000 03315nam a22005055i 4500
001 978-3-031-55533-6
003 DE-He213
005 20240730172159.0
007 cr nn 008mamaa
008 240527s2024 sz | s |||| 0|eng d
020 _a9783031555336
_9978-3-031-55533-6
024 7 _a10.1007/978-3-031-55533-6
_2doi
050 4 _aQA76.758
072 7 _aUMZ
_2bicssc
072 7 _aCOM051430
_2bisacsh
072 7 _aUMZ
_2thema
082 0 4 _a005.1068
_223
100 1 _avon Faber, Eberhard.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_9102189
245 1 0 _aManaging IT Service Security
_h[electronic resource] :
_bMethods and Recipes for User Organizations and Providers Along the Supply Chain /
_cby Eberhard von Faber.
250 _a1st ed. 2024.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2024.
300 _aXII, 172 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aPreface. -The Environment. - The Metasystem. - Assurance Management. - Taxonomy -- Document and Library Structure. - Secured by Definition. - Supply-Chain Relationship Management. - Cyber-Physical Systems (IoT and OT). - Perception, Knowledge, Competencies. - References -- Index.
520 _aThis book is about managing the security of IT services in terms of organization, orchestration, and optimization. It compresses the complex subject matter into individual terms and their definition, and it exploits systematics and terminology to create order, illuminate relationships, and provide concrete support for implementing IT service security successfully and with an eye for the essentials. The book describes a management system called ESARIS (Enterprise Security Architecture for Reliable ICT Services) with field-proven methods and recipes. This metasystem or security architecture builds on more than a decade of day-to-day experience in the IT industry with multi-national customers. To enable the reader to fully exploit the guidance given, explicit definitions are provided for about 75 terms that can be used to look up a topic. Numerous figures and tables further support orientation and understanding, together with detailed introductions and explanations they offer a comprehensive presentation of IT service security issues and solutions. This book is written for professionals with IT service providers (including IT departments), user organizations (including business units) or manufacturers, vendors, and suppliers.
650 0 _aSoftware engineering
_xManagement.
_912779
650 0 _aData protection.
_97245
650 0 _aBusiness logistics.
_94995
650 1 4 _aSoftware Management.
_952656
650 2 4 _aSecurity Services.
_978910
650 2 4 _aSupply Chain Management.
_932320
710 2 _aSpringerLink (Online service)
_9102193
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031555329
776 0 8 _iPrinted edition:
_z9783031555343
856 4 0 _uhttps://doi.org/10.1007/978-3-031-55533-6
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cEBK
999 _c88077
_d88077