
Outsourcing Information Security
C.Warren Axelrod - Collection Computer Security
Résumé
This comprehensive and timely resource examines security risks related to information technology (IT) outsourcing, clearly showing how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps professionals deepen their knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and information security (IS) functions.
Moreover, it enables practitioners to determine which IS functions should be performed by a third party, better manage third-party relationships, and ensure that any functions handed over to a third party meet good security standards. From discussions on the IT outsourcing marketplace and the pros and cons of the IT outsourcing decision process, to a look at IT and IS service provider relationships and trends affecting outsourcing, this essential reference provides insight into how organizations are addressing some of the more thorny issues of IT and security outsourcing.
L'auteur - C.Warren Axelrod
C. Warren Axelrod is a director of Pershing LLC, a BNY Securities Group Co., where he is responsible for global information security. He has been a senior information technology manager on Wall Street for more than 25 years, has contributed to numerous conferences and seminars, and has published extensively. He holds a Ph.D. in managerial economics from Cornell University, and a B.Sc. in electrical engineering and an M.A. in economics and statistics from Glasgow University. He is certified as a CISSP and CISM.
Sommaire
- Foreword
- Preface
- Acknowledgements
- Outsourcing and Information Security
- Information Security Risks
- Justifying Outsourcing
- Risks of Outsourcing
- Categorizing Cots and Benefits
- Costs and Benefits Throughout the Evaluation Process
- The Outsourcing Evaluation Process - Customer and Outsourcer Requirements
- Outsourcing Security Functions and Security Considerations When Outsourcing
- Summary of the Outsourcing Process - Soup to Nuts
- Appendix A : Candidate Security Services for Outsourcing
- Appendix B : A Brief History of IT Outsourcing
- Appendix C : A Brief History of Information Security
- Selected Bibliography
- About the Author
- Index
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Artech House |
Auteur(s) | C.Warren Axelrod |
Collection | Computer Security |
Parution | 19/11/2004 |
Nb. de pages | 248 |
Format | 15,5 x 23,5 |
Couverture | Relié |
Poids | 508g |
Intérieur | Noir et Blanc |
EAN13 | 9781580535311 |
ISBN13 | 978-1-58053-531-1 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Bases de données Conception et modélisation UML
- Informatique Bases de données Conception et modélisation Merise
- Informatique Informatique d'entreprise Management des systèmes d'information
- Informatique Informatique d'entreprise Knowledge management
- Informatique Informatique d'entreprise Data warehouse et data mining
- Informatique Informatique d'entreprise Sécurité
- Informatique Développement d'applications Gestion de projets
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Protocoles et standards PKI
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet