Supply chain risk management: applying secure acquisition principles to ensure a trusted technology product
Foreword -- Why secure information and communication technology (ICT) product acquisition matters -- Building a standard acquisition infrastructure -- The three building blocks for creating communities of trust -- Risk management in the ICT product chain -- Establishing a substantive control process...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton
CRC Press
[2018]
|
Schriftenreihe: | Internal audit and IT audit
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | Foreword -- Why secure information and communication technology (ICT) product acquisition matters -- Building a standard acquisition infrastructure -- The three building blocks for creating communities of trust -- Risk management in the ICT product chain -- Establishing a substantive control process -- Control sustainment and operational assurance -- Building a capable supply chain operation |
Beschreibung: | xxiv, 278 Seiten Illustrationen |
ISBN: | 9781138197350 9781138197336 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044736436 | ||
003 | DE-604 | ||
005 | 20180425 | ||
007 | t | ||
008 | 180130s2018 a||| |||| 00||| eng d | ||
020 | |a 9781138197350 |c hardback |9 978-1-138-19735-0 | ||
020 | |a 9781138197336 |c paperback |9 978-1-138-19733-6 | ||
035 | |a (OCoLC)1007806449 | ||
035 | |a (DE-599)GBV898304482 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-473 | ||
084 | |a QP 530 |0 (DE-625)141897: |2 rvk | ||
100 | 1 | |a Sigler, Ken |e Verfasser |0 (DE-588)1097228703 |4 aut | |
245 | 1 | 0 | |a Supply chain risk management |b applying secure acquisition principles to ensure a trusted technology product |c Ken Sigler, Dan Shoemaker and Anne Kohnke |
264 | 1 | |a Boca Raton |b CRC Press |c [2018] | |
264 | 4 | |c © 2018 | |
300 | |a xxiv, 278 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Internal audit and IT audit | |
520 | 3 | |a Foreword -- Why secure information and communication technology (ICT) product acquisition matters -- Building a standard acquisition infrastructure -- The three building blocks for creating communities of trust -- Risk management in the ICT product chain -- Establishing a substantive control process -- Control sustainment and operational assurance -- Building a capable supply chain operation | |
650 | 0 | 7 | |a Risikomanagement |0 (DE-588)4121590-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Supply Chain Management |0 (DE-588)4684051-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Risikomanagement |0 (DE-588)4121590-4 |D s |
689 | 0 | 1 | |a Supply Chain Management |0 (DE-588)4684051-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Shoemaker, Dan |e Verfasser |0 (DE-588)1052964745 |4 aut | |
700 | 1 | |a Kohnke, Anne |e Verfasser |0 (DE-588)115297842X |4 aut | |
856 | 4 | 2 | |m V:DE-601;B:DE-206 |q application/pdf |u http://www.gbv.de/dms/zbw/898304482.pdf |y Inhaltsverzeichnis |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-030132390 |
Datensatz im Suchindex
_version_ | 1804178236418031616 |
---|---|
any_adam_object | |
author | Sigler, Ken Shoemaker, Dan Kohnke, Anne |
author_GND | (DE-588)1097228703 (DE-588)1052964745 (DE-588)115297842X |
author_facet | Sigler, Ken Shoemaker, Dan Kohnke, Anne |
author_role | aut aut aut |
author_sort | Sigler, Ken |
author_variant | k s ks d s ds a k ak |
building | Verbundindex |
bvnumber | BV044736436 |
classification_rvk | QP 530 |
ctrlnum | (OCoLC)1007806449 (DE-599)GBV898304482 |
discipline | Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01971nam a2200409 c 4500</leader><controlfield tag="001">BV044736436</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180425 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">180130s2018 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781138197350</subfield><subfield code="c">hardback</subfield><subfield code="9">978-1-138-19735-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781138197336</subfield><subfield code="c">paperback</subfield><subfield code="9">978-1-138-19733-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1007806449</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV898304482</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 530</subfield><subfield code="0">(DE-625)141897:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sigler, Ken</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1097228703</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Supply chain risk management</subfield><subfield code="b">applying secure acquisition principles to ensure a trusted technology product</subfield><subfield code="c">Ken Sigler, Dan Shoemaker and Anne Kohnke</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">CRC Press</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxiv, 278 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Internal audit and IT audit</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Foreword -- Why secure information and communication technology (ICT) product acquisition matters -- Building a standard acquisition infrastructure -- The three building blocks for creating communities of trust -- Risk management in the ICT product chain -- Establishing a substantive control process -- Control sustainment and operational assurance -- Building a capable supply chain operation</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Supply Chain Management</subfield><subfield code="0">(DE-588)4684051-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Supply Chain Management</subfield><subfield code="0">(DE-588)4684051-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shoemaker, Dan</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1052964745</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kohnke, Anne</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)115297842X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">V:DE-601;B:DE-206</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://www.gbv.de/dms/zbw/898304482.pdf</subfield><subfield code="y">Inhaltsverzeichnis</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030132390</subfield></datafield></record></collection> |
id | DE-604.BV044736436 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:00:46Z |
institution | BVB |
isbn | 9781138197350 9781138197336 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030132390 |
oclc_num | 1007806449 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG |
owner_facet | DE-473 DE-BY-UBG |
physical | xxiv, 278 Seiten Illustrationen |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | CRC Press |
record_format | marc |
series2 | Internal audit and IT audit |
spelling | Sigler, Ken Verfasser (DE-588)1097228703 aut Supply chain risk management applying secure acquisition principles to ensure a trusted technology product Ken Sigler, Dan Shoemaker and Anne Kohnke Boca Raton CRC Press [2018] © 2018 xxiv, 278 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Internal audit and IT audit Foreword -- Why secure information and communication technology (ICT) product acquisition matters -- Building a standard acquisition infrastructure -- The three building blocks for creating communities of trust -- Risk management in the ICT product chain -- Establishing a substantive control process -- Control sustainment and operational assurance -- Building a capable supply chain operation Risikomanagement (DE-588)4121590-4 gnd rswk-swf Supply Chain Management (DE-588)4684051-5 gnd rswk-swf Risikomanagement (DE-588)4121590-4 s Supply Chain Management (DE-588)4684051-5 s DE-604 Shoemaker, Dan Verfasser (DE-588)1052964745 aut Kohnke, Anne Verfasser (DE-588)115297842X aut V:DE-601;B:DE-206 application/pdf http://www.gbv.de/dms/zbw/898304482.pdf Inhaltsverzeichnis Inhaltsverzeichnis |
spellingShingle | Sigler, Ken Shoemaker, Dan Kohnke, Anne Supply chain risk management applying secure acquisition principles to ensure a trusted technology product Risikomanagement (DE-588)4121590-4 gnd Supply Chain Management (DE-588)4684051-5 gnd |
subject_GND | (DE-588)4121590-4 (DE-588)4684051-5 |
title | Supply chain risk management applying secure acquisition principles to ensure a trusted technology product |
title_auth | Supply chain risk management applying secure acquisition principles to ensure a trusted technology product |
title_exact_search | Supply chain risk management applying secure acquisition principles to ensure a trusted technology product |
title_full | Supply chain risk management applying secure acquisition principles to ensure a trusted technology product Ken Sigler, Dan Shoemaker and Anne Kohnke |
title_fullStr | Supply chain risk management applying secure acquisition principles to ensure a trusted technology product Ken Sigler, Dan Shoemaker and Anne Kohnke |
title_full_unstemmed | Supply chain risk management applying secure acquisition principles to ensure a trusted technology product Ken Sigler, Dan Shoemaker and Anne Kohnke |
title_short | Supply chain risk management |
title_sort | supply chain risk management applying secure acquisition principles to ensure a trusted technology product |
title_sub | applying secure acquisition principles to ensure a trusted technology product |
topic | Risikomanagement (DE-588)4121590-4 gnd Supply Chain Management (DE-588)4684051-5 gnd |
topic_facet | Risikomanagement Supply Chain Management |
url | http://www.gbv.de/dms/zbw/898304482.pdf |
work_keys_str_mv | AT siglerken supplychainriskmanagementapplyingsecureacquisitionprinciplestoensureatrustedtechnologyproduct AT shoemakerdan supplychainriskmanagementapplyingsecureacquisitionprinciplestoensureatrustedtechnologyproduct AT kohnkeanne supplychainriskmanagementapplyingsecureacquisitionprinciplestoensureatrustedtechnologyproduct |