Secure ICT service provisioning for cloud, mobile and beyond : ESARIS : the answer to the demands of industrialized IT production balancing between buyers and providers /
Saved in:
Author / Creator: | Faber, Eberhard von, author. |
---|---|
Edition: | 2nd updated and extended edition. |
Imprint: | Wiesbaden, Germany : Springer Vieweg, 2017. |
Description: | 1 online resource (xiv, 369 pages) : color illustrations |
Language: | English |
Series: | Edition Edition |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11272602 |
MARC
LEADER | 00000cam a2200000Ii 4500 | ||
---|---|---|---|
001 | 11272602 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 170324s2017 gw a ob 001 0 eng d | ||
005 | 20240715205042.4 | ||
019 | |a 981886836 |a 981980791 |a 982012452 |a 982015366 | ||
020 | |a 9783658164829 |q (electronic bk.) | ||
020 | |a 3658164824 |q (electronic bk.) | ||
020 | |z 9783658164812 |q (print) | ||
020 | |z 3658164816 | ||
024 | 7 | |a 10.1007/978-3-658-16482-9 |2 doi | |
035 | |a (OCoLC)978332345 |z (OCoLC)981886836 |z (OCoLC)981980791 |z (OCoLC)982012452 |z (OCoLC)982015366 | ||
035 | 9 | |a (OCLCCM-CC)978332345 | |
040 | |a GW5XE |b eng |e rda |e pn |c GW5XE |d N$T |d YDX |d UAB |d N$T |d EBLCP |d NJR |d OCLCF |d IOG |d ESU |d JG0 |d JBG |d IAD |d ICW |d ICN |d OTZ |d U3W |d MERUC |d CAUOI |d OCLCQ |d KSU |d WYU |d OCLCQ |d AUD |d OCLCQ |d ERF |d OCLCQ |d AJS | ||
049 | |a MAIN | ||
050 | 4 | |a TK5105.59 |b .F33 2017eb | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
100 | 1 | |a Faber, Eberhard von, |e author. | |
245 | 1 | 0 | |a Secure ICT service provisioning for cloud, mobile and beyond : |b ESARIS : the answer to the demands of industrialized IT production balancing between buyers and providers / |c Eberhard von Faber, Wolfgang Behnsen. |
250 | |a 2nd updated and extended edition. | ||
264 | 1 | |a Wiesbaden, Germany : |b Springer Vieweg, |c 2017. | |
300 | |a 1 online resource (xiv, 369 pages) : |b color illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Edition <kes> | |
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Online resource; title from PDF title page (SpringerLink, viewed March 24, 2017). | |
505 | 0 | |a Challenges -- Transparency, interaction and standardization -- Dimensions, work areas, hierarchy, collaboration model -- Security taxonomy and its everyday use -- Secured by definition: integration with core business.-Standardization concepts and practice -- Attainment: achieving compliance with standards -- Fulfillment: meeting customer demands -- Flexibility: managing the supplier network -- Maintenance: document management and more -- Transformation: sustainable roll-out -- Implementation: IT production and its protection in practice -- Routine: day-to-day security management using ESARIS. | |
520 | |a This book describes new methods and measures which enable ICT service providers and large IT departments to provide secure ICT services in an industrialized IT production environment characterized by rigorous specialization, standardization and division of labor along the complete supply chain. This book is also for suppliers playing their role in this industry. Even more important, user organizations are given deep insight in secure IT production which allows them to make the best out of cloud, mobile and beyond. This book presents a new organization and classification scheme being thoroughly modular and hierarchical. It contains a security taxonomy that organizes all aspects of modern industrialized IT production. The approach takes operational requirements into account and focuses on user requirements, thus facing the reality in the market economy. Despite cost pressure, providers must ensure security by exploiting economies of scale to raise the efficiency also with respect to security. Furthermore, this book describes a wealth of security measures derived from real-world challenges in IT production and IT service management. Contents Challenges - Transparency, interaction and standardization - Dimensions, work areas, hierarchy, collaboration model - Security taxonomy and everyday use - Secured by definition: integration with core business - Standardization concepts and practice - Attainment: achieving compliance with standards - Fulfillment: meeting customer demands - Flexibility: managing the supplier network - Maintenance: document management and more - Transformation: sustainable roll-out - Implementation: IT production and its protection in practice - Routine: day-to-day security management using ESARIS Target Groups IT managers and architects of user organizations and ICT service providers, Security managers, Portfolio and process managers, Consultants and auditors, Employees in IT functions being concerned with security, anyone interested in industrialized IT production About the Authors Eberhard von Faber has an about 25-year-industrial experience in information security. His field of work at T-Systems is Security Strategy and Executive Consulting. He is also a professor at Brandenburg University of Applied Science. Wolfgang Behnsen, being retired now, was Senior Security Manager at T-Systems. He worked in several roles in information security management during his professional career. He holds various recognized security certificates and is member of diverse associations. | ||
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Data protection. |0 http://id.loc.gov/authorities/subjects/sh85035859 | |
650 | 0 | |a Telecommunication |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh85133285 | |
650 | 7 | |a COMPUTERS |x Security |x Networking. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures. |2 fast |0 (OCoLC)fst00872341 | |
650 | 7 | |a Data protection. |2 fast |0 (OCoLC)fst00887958 | |
650 | 7 | |a Telecommunication |x Security measures. |2 fast |0 (OCoLC)fst01145928 | |
655 | 0 | |a Electronic books. | |
655 | 4 | |a Electronic books. | |
700 | 1 | |a Behnsen, Wolfgang, |e author. | |
776 | 0 | 8 | |i Print version: |a Faber, Eberhard von. |t Secure ICT service provisioning for cloud, mobile and beyond. |b 2nd updated and extended edition. |d Wiesbaden, Germany : Springer Vieweg, 2017 |z 3658164816 |z 9783658164812 |w (OCoLC)962009253 |
830 | 0 | |a Edition <Kes>. |0 http://id.loc.gov/authorities/names/no2013039326 | |
903 | |a HeVa | ||
929 | |a oclccm | ||
999 | f | f | |i ac400e0f-3233-5b3b-bf00-07459abd11e3 |s 5db5de41-9d3c-5776-afa4-ee19ec232d3d |
928 | |t Library of Congress classification |a TK5105.59 .F33 2017eb |l Online |c UC-FullText |u https://link.springer.com/10.1007/978-3-658-16482-9 |z Springer Nature |g ebooks |i 12545620 |