000711068 000__ 02817cam\a2200421\i\4500 000711068 001__ 711068 000711068 005__ 20210515100917.0 000711068 006__ m\\\\\o\\d\\\\\\\\ 000711068 007__ cr\cn\nnnunnun 000711068 008__ 141028t20142014fluad\\\o\\\\\000\0\eng\d 000711068 020__ $$a9781439879108$$qelectronic book 000711068 020__ $$z9781439879092 000711068 035__ $$a(OCoLC)ocn869311216 000711068 035__ $$a(CaPaEBR)ebr10802502 000711068 035__ $$a711068 000711068 040__ $$aCaPaEBR$$beng$$erda$$epn$$cCaPaEBR 000711068 05014 $$aHD30.2$$b.S54 2014eb 000711068 1001_ $$aSiepmann, Frank. 000711068 24510 $$aManaging risk and security in outsourcing IT services$$h[electronic resource] :$$bonshore, offshore and the cloud /$$cFrank Siepmann, CISM, CISSP, ISSAP, NSA-IAM, NSA-IEM. 000711068 264_1 $$aBoca Raton :$$bCRC Press,$$c[2014] 000711068 264_4 $$c©2014 000711068 300__ $$a1 online resource (xvii, 226 pages) :$$billustrations 000711068 336__ $$atext$$2rdacontent 000711068 337__ $$acomputer$$2rdamedia 000711068 338__ $$aonline resource$$2rdacarrier 000711068 500__ $$a"An Auerbach Book"--T.p. 000711068 504__ $$aIncludes bibliographical references and index. 000711068 5050_ $$aChapter 1. Outsourcing -- chapter 2. The Cloud -- chapter 3. Before you decide to outsource -- chapter 4. Ready to outsource -- chapter 5. Day one and beyond -- chapter 6. When we part -- chapter 7. Outsourcing anecdotes. 000711068 506__ $$aAccess limited to authorized users. 000711068 520__ $$aCovering onshore, offshore, and cloud services, this book provides concrete examples and illustrative case studies that describe the specifics of what to do and what not to do across a variety of implementation scenarios. This book will be especially helpful to managers challenged with an outsourcing situation -- whether preparing for it, living it day to day, or being tasked to safely bring back information systems to the organization. This book not only provides the technical background required, but also the practical information about outsourcing and its mechanics. By describing and analyzing outsourcing industry processes and technologies, along with their security and privacy impacts, this book provides the fundamental understanding and guidance you need to keep your information, processes, and people secure when IT services are outsourced. 000711068 588__ $$aDescription based on print version record. 000711068 650_0 $$aComputer networks$$xSecurity measures. 000711068 650_0 $$aInformation technology$$xContracting out. 000711068 650_0 $$aCloud computing$$xSecurity measures. 000711068 77608 $$iPrint version:$$aSiepmann, Frank.$$tManaging risk and security in outsourcing IT services.$$dBoca Raton : CRC Press, [2014]$$z9781439879092$$w(DLC) 2012276182$$w(OCoLC)862760071 000711068 8520_ $$bacq 000711068 85280 $$bebk$$hEbrary 000711068 85640 $$3ProQuest Ebook Central$$uhttps://univsouthin.idm.oclc.org/login?url=https://ebookcentral.proquest.com/lib/usiricelib-ebooks/detail.action?docID=1407561$$zOnline Access 000711068 909CO $$ooai:library.usi.edu:711068$$pGLOBAL_SET 000711068 980__ $$aEBOOK 000711068 980__ $$aBIB 000711068 982__ $$aEbook 000711068 983__ $$aOnline