Utsourcing Information Security


Download Utsourcing Information Security PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Utsourcing Information Security book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Outsourcing Information Security


Outsourcing Information Security

Author: C. Warren Axelrod

language: en

Publisher: Artech House

Release Date: 2004


DOWNLOAD





This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.

Stepping Through the InfoSec Program


Stepping Through the InfoSec Program

Author: J. L. Bayuk

language: en

Publisher: ISACA

Release Date: 2007


DOWNLOAD





Outsourcing Information Security


Outsourcing Information Security

Author: C. Warren Axelrod

language: en

Publisher: Artech House Publishers

Release Date: 2004-01-01


DOWNLOAD





This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions. Moreover, it enables you to determine which information security functions should be performed by a third party, better manage third-party relationships, and ensure that any functions handed over to a third party meet good security standards.