Secure ICT Service Provisioning for Cloud, Mobile and Beyond (Record no. 103894)

000 -LEADER
fixed length control field 04057nam a22004695i 4500
001 - CONTROL NUMBER
control field 978-3-658-00069-1
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140220083331.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 121212s2012 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783658000691
-- 978-3-658-00069-1
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-658-00069-1
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HF5415.1265
072 #7 - SUBJECT CATEGORY CODE
Subject category code UF
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code KJE
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM064000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code BUS090000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.872
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Faber, Eberhard.
Relator term author.
245 10 - TITLE STATEMENT
Title Secure ICT Service Provisioning for Cloud, Mobile and Beyond
Medium [electronic resource] :
Remainder of title A Workable Architectural Approach Balancing Between Buyers and Providers /
Statement of responsibility, etc by Eberhard Faber, Wolfgang Behnsen.
264 #1 -
-- Wiesbaden :
-- Springer Fachmedien Wiesbaden :
-- Imprint: Springer Vieweg,
-- 2012.
300 ## - PHYSICAL DESCRIPTION
Extent XIII, 284 p. 94 illus. in color.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Edition
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Security, Assurance and the Division of Labor -- Industrialization Concept, Requirements Treatment and Composition of Services -- Work Areas, Collaboration Model and Hierarchy of Security Standards -- Concept of Double Direction Standards -- Security Taxonomy: Criteria, Goals and Result -- Internal Structureand Usage of the ICT Security Standards -- Rollout Process.
520 ## - SUMMARY, ETC.
Summary, etc In this book a reference architecture is introduced enhancing the security of the services offered in the information and communication technology (ICT) market. Customers will be able to compare offerings and to assess risks associated with using third-party ICT services including cloud computing and mobile services. Service providers are provided with a comprehensive blueprint for security implementation and maintenance covering service portfolio management, bid phases and realization projects as well as the service delivery management. The architecture is thoroughly modular and hierarchical. It contains a security taxonomy that organizes all aspects of modern industrialized ICT production. The book also describes a wealth of security measures derived from real-world challenges in ICT production and service management.  Contents Security, assurance and the division of labor – Framework, Industrialization concept – Work areas, Collaboration model, Hierarchy of security standards, Usage model – Security taxonomy: Derivation, Map, Content, Specification concept – Production security in practice: Evidence and customer relation, Service management, ICT service access, IT service production, Certification and risk management - Customer fulfillment model, Compliance attainment model – Rollout process  Target Groups IT managers and architects of user organizations and ICT service providers, Security managers, Portfolio and process managers, Consultants and auditors, Employees in IT functions being concerned with security, anyone interested in industrialized ICT production  About the Authors Eberhard von Faber has more than 20 years industrial experience in information security. His workspace at T-Systems is Security Strategy and Executive Consulting. He is also a professor at Brandenburg University of Applied Science. Wolfgang Behnsen is Senior Security Manager at T-Systems. He worked in several roles in information security management. He holds several recognized security certificates and is member of diverse associations.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element e-Commerce/e-business.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Science, general.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Behnsen, Wolfgang.
Relator term author.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783658000684
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Edition
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-658-00069-1
912 ## -
-- ZDB-2-SCS

No items available.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue