logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

일간
|
주간
|
월간

실시간 검색어

검색가능 서점

도서목록 제공

Managing Risk and Security in Outsourcing IT Services : Onshore, Offshore and the Cloud

Managing Risk and Security in Outsourcing IT Services : Onshore, Offshore and the Cloud (Hardcover)

Frank Siepmann (지은이)
Taylor & Francis
147,220원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
120,720원 -18% 0원
6,040원
114,680원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Managing Risk and Security in Outsourcing IT Services : Onshore, Offshore and the Cloud
eBook 미리보기

책 정보

· 제목 : Managing Risk and Security in Outsourcing IT Services : Onshore, Offshore and the Cloud (Hardcover) 
· 분류 : 외국도서 > 경제경영 > 산업 > 서비스
· ISBN : 9781439879092
· 쪽수 : 244쪽
· 출판일 : 2013-12-09

목차

Outsourcing
History of Outsourcing
     The Early Days of Outsourcing 
     Current State
Delivery Models 
     Onshoring 
     Nearshoring 
     Offshoring
Outsourcing Types 
     Technology Outsourcing 
     Business Transformation Outsourcing 
     Business Process Outsourcing 
     Knowledge Process Outsourcing
The Internals of Outsourcing 
     The Phases 
     Typical Financial Outsourcing Model 
     Geographical Regions
The Top Outsourcing Countries 
     India 
     Indonesia 
     Estonia 
     Singapore 
     China
     Bulgaria 
     Philippines 
     Thailand
     Lithuania 
     Malaysia
Outsourcing Personnel
     Consulting Personnel 
     Former Employees of Clients
     Internal Resources 
     Third-Party Personnel 
     Hired Personnel 
     Teams 
     Salaries 
     Growth Strategies

The Cloud
Software as a Service (SaaS) 
     Platform as a Service (PaaS)
     Infrastructure as a Service (IaaS)
     Private Cloud 
     Community Cloud 
     Public Cloud 
     Hybrid Clouds 
     What the Cloud Is and Is Not
Beyond the Cloud 
     Virtual Private Cloud 
     Standardization between CSPs 
     Compliance in the Cloud
Security and Privacy Issues with Cloud Computing 
     Scalability versus Elasticity 
     On-Demand Self-Service 
     Rapid Elasticity 
     Resource Pooling 
     Outages 
     Denial of Service 
     Virtualization Security 
     Metering 
     Hypervisor Security 
     Virtual Networks
     Memory Allocation/Wiping 
     Cloud Network Configuration 
     Firewalls in the Cloud 
     Self-Service
     Malicious Insiders 
     Availability and Service Level Agreements 
     Authentication, Authorization, Accounting 
     Tenant Credibility
Address the Cloud Security/Privacy Dilemma 
     SAS-70, SOC 1, and SOC 2 Audits 
     Cryptography and the Cloud
     Encryption Keys and the Cloud 
     Third-Party Cloud Security Providers 
     FedRAMP and the Federal Cloud 
     How to Securely Move to the Cloud

Before You Decide to Outsource
Security and Privacy Impacts
Secure Communication 
     Telephone
     e-Mail 
     Mobile/Cell Phones 
     Smartphone 
     BlackBerry
     Instant Messenger 
     Letter and Parcels
Organizational Impacts
Legal Aspects
Personnel Issues
Technical Challenges 
     Network Address Translation (NAT) Issues 
     Single Sign-On and Federation (SAML/XACML) 
     Backup Technologies 
     Remote Desktop Support 
     Trouble Ticket Systems
Business Continuity

Ready to Outsource
The Perfect Outsourcing Company
Doing Your Homework
Understand What Is Offered 
     Audit Reports 
     Is BTO the Right Choice? 
     Ask the Right Questions 
     Dedicated Resources or Not? 
     Talking with Existing Clients 
     What Matters for the Outsourcing Company? 
     Challenges Outsourcing Companies Face 
     Which Security Controls?Ours or Theirs? 
     Staff Augmentation 
     Complete Outsourced Operation 
     Cost Savings
     Security Controls
Next Step?Clean House 
     Maturity Level
     Alignment of IT and Security Strategy 
     Gap Analysis
Outsourcing Preparation 
     Information Security Policy 
     Organization of Information Security 
     External Parties’ Security 
     Information Classification Security 
     Prior to Employment Security 
     During Employment Security 
     Termination or Change-of-Employment Security
     Outsourcing Security Readiness Assessment
     Tactical Goals?Now or Later? 
     Strategic Objectives?When?

Day One and Beyond
Enabling the Outsourcer 
     Access to Required Information
     Documentation 
     Personnel
Transition Phase
The Stable Years 
     Security Incidents
     Outsourcing Personnel Turnover 
     Regular Activities 
     Reporting

When We Part
How to Prepare 
     The Contract 
     Analysis of What Needs to Be Done 
     The Exit Plan
When the Day Comes
Taking Control

Outsourcing Anecdotes
British Health Records
Transportation Strike in Bangalore
Submarine Cable Cuts
Cloud Outages
     T-Mobile: Sidekick in Danger of the Microsoft Cloud
     Outages at Amazon Are Sometimes Due to "Gossip" 
     Google Services Impacted by Cloud Outages 
     Microsoft’s Azure and Hotmail 
     Salesforce.com’s Cloud Goes Down
     CloudFlare DDoS
Background Investigation Lacking
Privacy Laws?Not Here
Can You Hear Me Now? CDMA Limitations
Overlooked
Transformation Successful?Patient Dead
Public Instant Messenger?Share the Joy

저자소개

Frank Siepmann (지은이)    정보 더보기
펼치기
이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책