000 | 03315nam a22005055i 4500 | ||
---|---|---|---|
001 | 978-3-031-55533-6 | ||
003 | DE-He213 | ||
005 | 20240730172159.0 | ||
007 | cr nn 008mamaa | ||
008 | 240527s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031555336 _9978-3-031-55533-6 |
||
024 | 7 |
_a10.1007/978-3-031-55533-6 _2doi |
|
050 | 4 | _aQA76.758 | |
072 | 7 |
_aUMZ _2bicssc |
|
072 | 7 |
_aCOM051430 _2bisacsh |
|
072 | 7 |
_aUMZ _2thema |
|
082 | 0 | 4 |
_a005.1068 _223 |
100 | 1 |
_avon Faber, Eberhard. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _9102189 |
|
245 | 1 | 0 |
_aManaging IT Service Security _h[electronic resource] : _bMethods and Recipes for User Organizations and Providers Along the Supply Chain / _cby Eberhard von Faber. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2024. |
|
300 |
_aXII, 172 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aPreface. -The Environment. - The Metasystem. - Assurance Management. - Taxonomy -- Document and Library Structure. - Secured by Definition. - Supply-Chain Relationship Management. - Cyber-Physical Systems (IoT and OT). - Perception, Knowledge, Competencies. - References -- Index. | |
520 | _aThis book is about managing the security of IT services in terms of organization, orchestration, and optimization. It compresses the complex subject matter into individual terms and their definition, and it exploits systematics and terminology to create order, illuminate relationships, and provide concrete support for implementing IT service security successfully and with an eye for the essentials. The book describes a management system called ESARIS (Enterprise Security Architecture for Reliable ICT Services) with field-proven methods and recipes. This metasystem or security architecture builds on more than a decade of day-to-day experience in the IT industry with multi-national customers. To enable the reader to fully exploit the guidance given, explicit definitions are provided for about 75 terms that can be used to look up a topic. Numerous figures and tables further support orientation and understanding, together with detailed introductions and explanations they offer a comprehensive presentation of IT service security issues and solutions. This book is written for professionals with IT service providers (including IT departments), user organizations (including business units) or manufacturers, vendors, and suppliers. | ||
650 | 0 |
_aSoftware engineering _xManagement. _912779 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aBusiness logistics. _94995 |
|
650 | 1 | 4 |
_aSoftware Management. _952656 |
650 | 2 | 4 |
_aSecurity Services. _978910 |
650 | 2 | 4 |
_aSupply Chain Management. _932320 |
710 | 2 |
_aSpringerLink (Online service) _9102193 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031555329 |
776 | 0 | 8 |
_iPrinted edition: _z9783031555343 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-55533-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cEBK | ||
999 |
_c88077 _d88077 |