Outsourcing Information Security

Outsourcing Information Security
Author :
Publisher : Artech House
Total Pages : 292
Release :
ISBN-10 : 1580539556
ISBN-13 : 9781580539555
Rating : 4/5 (555 Downloads)

Book Synopsis Outsourcing Information Security by : C. Warren Axelrod

Download or read book Outsourcing Information Security written by C. Warren Axelrod and published by Artech House. This book was released on 2004 with total page 292 pages. Available in PDF, EPUB and Kindle. Book excerpt: This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.


Outsourcing Information Security Related Books

Outsourcing Information Security
Language: en
Pages: 292
Authors: C. Warren Axelrod
Categories: Computers
Type: BOOK - Published: 2004 - Publisher: Artech House

GET EBOOK

This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage t
Outsourcing Security
Language: en
Pages: 238
Authors: Bruce E. Stanley
Categories: History
Type: BOOK - Published: 2015-07-15 - Publisher: U of Nebraska Press

GET EBOOK

Faced with a decreasing supply of national troops, dwindling defense budgets, and the ever-rising demand for boots on the ground in global conflicts and humanit
The Routledge Research Companion to Security Outsourcing
Language: en
Pages: 336
Authors: Joakim Berndtsson
Categories: Political Science
Type: BOOK - Published: 2016-06-10 - Publisher: Routledge

GET EBOOK

Conveniently structured into five sections, The Routledge Research Companion to Outsourcing Security offers an overview of the different ways in which states ha
Security Strategy
Language: en
Pages: 319
Authors: Bill Stackpole
Categories: Business & Economics
Type: BOOK - Published: 2010-10-13 - Publisher: CRC Press

GET EBOOK

Clarifying the purpose and place of strategy in an information security program, this book explains how to select, develop, and deploy the security strategy bes
Tunable Security for Deployable Data Outsourcing
Language: en
Pages: 282
Authors: Koehler, Jens
Categories: Electronic computers. Computer science
Type: BOOK - Published: 2015-08-18 - Publisher: KIT Scientific Publishing

GET EBOOK

Security mechanisms like encryption negatively affect other software quality characteristics like efficiency. To cope with such trade-offs, it is preferable to