Secure ICT service provisioning for cloud, mobile and beyond : ESARIS : the answer to the demands of industrialized IT production balancing between buyers and providers /

Saved in:
Bibliographic Details
Author / Creator:Faber, Eberhard von, author.
Edition:2nd updated and extended edition.
Imprint:Wiesbaden, Germany : Springer Vieweg, 2017.
Description:1 online resource (xiv, 369 pages) : color illustrations
Language:English
Series:Edition
Edition .
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11272602
Hidden Bibliographic Details
Other authors / contributors:Behnsen, Wolfgang, author.
ISBN:9783658164829
3658164824
9783658164812
3658164816
Notes:Includes bibliographical references and index.
Online resource; title from PDF title page (SpringerLink, viewed March 24, 2017).
Summary:This book describes new methods and measures which enable ICT service providers and large IT departments to provide secure ICT services in an industrialized IT production environment characterized by rigorous specialization, standardization and division of labor along the complete supply chain. This book is also for suppliers playing their role in this industry. Even more important, user organizations are given deep insight in secure IT production which allows them to make the best out of cloud, mobile and beyond. This book presents a new organization and classification scheme being thoroughly modular and hierarchical. It contains a security taxonomy that organizes all aspects of modern industrialized IT production. The approach takes operational requirements into account and focuses on user requirements, thus facing the reality in the market economy. Despite cost pressure, providers must ensure security by exploiting economies of scale to raise the efficiency also with respect to security. Furthermore, this book describes a wealth of security measures derived from real-world challenges in IT production and IT service management. Contents Challenges - Transparency, interaction and standardization - Dimensions, work areas, hierarchy, collaboration model - Security taxonomy and everyday use - Secured by definition: integration with core business - Standardization concepts and practice - Attainment: achieving compliance with standards - Fulfillment: meeting customer demands - Flexibility: managing the supplier network - Maintenance: document management and more - Transformation: sustainable roll-out - Implementation: IT production and its protection in practice - Routine: day-to-day security management using ESARIS Target Groups IT managers and architects of user organizations and ICT service providers, Security managers, Portfolio and process managers, Consultants and auditors, Employees in IT functions being concerned with security, anyone interested in industrialized IT production About the Authors Eberhard von Faber has an about 25-year-industrial experience in information security. His field of work at T-Systems is Security Strategy and Executive Consulting. He is also a professor at Brandenburg University of Applied Science. Wolfgang Behnsen, being retired now, was Senior Security Manager at T-Systems. He worked in several roles in information security management during his professional career. He holds various recognized security certificates and is member of diverse associations.
Other form:Print version: Faber, Eberhard von. Secure ICT service provisioning for cloud, mobile and beyond. 2nd updated and extended edition. Wiesbaden, Germany : Springer Vieweg, 2017 3658164816 9783658164812
Standard no.:10.1007/978-3-658-16482-9

MARC

LEADER 00000cam a2200000Ii 4500
001 11272602
006 m o d
007 cr cnu|||unuuu
008 170324s2017 gw a ob 001 0 eng d
005 20240715205042.4
019 |a 981886836  |a 981980791  |a 982012452  |a 982015366 
020 |a 9783658164829  |q (electronic bk.) 
020 |a 3658164824  |q (electronic bk.) 
020 |z 9783658164812  |q (print) 
020 |z 3658164816 
024 7 |a 10.1007/978-3-658-16482-9  |2 doi 
035 |a (OCoLC)978332345  |z (OCoLC)981886836  |z (OCoLC)981980791  |z (OCoLC)982012452  |z (OCoLC)982015366 
035 9 |a (OCLCCM-CC)978332345 
040 |a GW5XE  |b eng  |e rda  |e pn  |c GW5XE  |d N$T  |d YDX  |d UAB  |d N$T  |d EBLCP  |d NJR  |d OCLCF  |d IOG  |d ESU  |d JG0  |d JBG  |d IAD  |d ICW  |d ICN  |d OTZ  |d U3W  |d MERUC  |d CAUOI  |d OCLCQ  |d KSU  |d WYU  |d OCLCQ  |d AUD  |d OCLCQ  |d ERF  |d OCLCQ  |d AJS 
049 |a MAIN 
050 4 |a TK5105.59  |b .F33 2017eb 
072 7 |a COM  |x 043050  |2 bisacsh 
100 1 |a Faber, Eberhard von,  |e author. 
245 1 0 |a Secure ICT service provisioning for cloud, mobile and beyond :  |b ESARIS : the answer to the demands of industrialized IT production balancing between buyers and providers /  |c Eberhard von Faber, Wolfgang Behnsen. 
250 |a 2nd updated and extended edition. 
264 1 |a Wiesbaden, Germany :  |b Springer Vieweg,  |c 2017. 
300 |a 1 online resource (xiv, 369 pages) :  |b color illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Edition <kes> 
504 |a Includes bibliographical references and index. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed March 24, 2017). 
505 0 |a Challenges -- Transparency, interaction and standardization -- Dimensions, work areas, hierarchy, collaboration model -- Security taxonomy and its everyday use -- Secured by definition: integration with core business.-Standardization concepts and practice -- Attainment: achieving compliance with standards -- Fulfillment: meeting customer demands -- Flexibility: managing the supplier network -- Maintenance: document management and more -- Transformation: sustainable roll-out -- Implementation: IT production and its protection in practice -- Routine: day-to-day security management using ESARIS. 
520 |a This book describes new methods and measures which enable ICT service providers and large IT departments to provide secure ICT services in an industrialized IT production environment characterized by rigorous specialization, standardization and division of labor along the complete supply chain. This book is also for suppliers playing their role in this industry. Even more important, user organizations are given deep insight in secure IT production which allows them to make the best out of cloud, mobile and beyond. This book presents a new organization and classification scheme being thoroughly modular and hierarchical. It contains a security taxonomy that organizes all aspects of modern industrialized IT production. The approach takes operational requirements into account and focuses on user requirements, thus facing the reality in the market economy. Despite cost pressure, providers must ensure security by exploiting economies of scale to raise the efficiency also with respect to security. Furthermore, this book describes a wealth of security measures derived from real-world challenges in IT production and IT service management. Contents Challenges - Transparency, interaction and standardization - Dimensions, work areas, hierarchy, collaboration model - Security taxonomy and everyday use - Secured by definition: integration with core business - Standardization concepts and practice - Attainment: achieving compliance with standards - Fulfillment: meeting customer demands - Flexibility: managing the supplier network - Maintenance: document management and more - Transformation: sustainable roll-out - Implementation: IT production and its protection in practice - Routine: day-to-day security management using ESARIS Target Groups IT managers and architects of user organizations and ICT service providers, Security managers, Portfolio and process managers, Consultants and auditors, Employees in IT functions being concerned with security, anyone interested in industrialized IT production About the Authors Eberhard von Faber has an about 25-year-industrial experience in information security. His field of work at T-Systems is Security Strategy and Executive Consulting. He is also a professor at Brandenburg University of Applied Science. Wolfgang Behnsen, being retired now, was Senior Security Manager at T-Systems. He worked in several roles in information security management during his professional career. He holds various recognized security certificates and is member of diverse associations. 
650 0 |a Computer networks  |x Security measures.  |0 http://id.loc.gov/authorities/subjects/sh94001277 
650 0 |a Data protection.  |0 http://id.loc.gov/authorities/subjects/sh85035859 
650 0 |a Telecommunication  |x Security measures.  |0 http://id.loc.gov/authorities/subjects/sh85133285 
650 7 |a COMPUTERS  |x Security  |x Networking.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
650 7 |a Telecommunication  |x Security measures.  |2 fast  |0 (OCoLC)fst01145928 
655 0 |a Electronic books. 
655 4 |a Electronic books. 
700 1 |a Behnsen, Wolfgang,  |e author. 
776 0 8 |i Print version:  |a Faber, Eberhard von.  |t Secure ICT service provisioning for cloud, mobile and beyond.  |b 2nd updated and extended edition.  |d Wiesbaden, Germany : Springer Vieweg, 2017  |z 3658164816  |z 9783658164812  |w (OCoLC)962009253 
830 0 |a Edition <Kes>.  |0 http://id.loc.gov/authorities/names/no2013039326 
903 |a HeVa 
929 |a oclccm 
999 f f |i ac400e0f-3233-5b3b-bf00-07459abd11e3  |s 5db5de41-9d3c-5776-afa4-ee19ec232d3d 
928 |t Library of Congress classification  |a TK5105.59 .F33 2017eb  |l Online  |c UC-FullText  |u https://link.springer.com/10.1007/978-3-658-16482-9  |z Springer Nature  |g ebooks  |i 12545620