Ken Sigler, Dan Shoemaker, Anne Kohnke
Supply Chain Risk Management
Applying Secure Acquisition Principles to Ensure a Trusted Technology Product
Ken Sigler, Dan Shoemaker, Anne Kohnke
Supply Chain Risk Management
Applying Secure Acquisition Principles to Ensure a Trusted Technology Product
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems.
Andere Kunden interessierten sich auch für
- Rajesh JugulumRobust Quality71,99 €
- Boyd L SummersSoftware Engineering Reviews and Audits83,99 €
- Matthew A WallerIntegrating Blockchain Into Supply Chain Management66,99 €
- Supply Chain Finance89,99 €
- Barry Crocker101 Models of Procurement and Supply Chain Management24,99 €
- Anatoliy SwishchukRandom Dynamical Systems in Finance91,99 €
- Qeis KamranStrategic Value Chain Management72,99 €
-
-
-
The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: CRC Press
- Seitenzahl: 278
- Erscheinungstermin: 3. November 2017
- Englisch
- Abmessung: 229mm x 152mm x 15mm
- Gewicht: 431g
- ISBN-13: 9781138197336
- ISBN-10: 1138197335
- Artikelnr.: 50154499
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: CRC Press
- Seitenzahl: 278
- Erscheinungstermin: 3. November 2017
- Englisch
- Abmessung: 229mm x 152mm x 15mm
- Gewicht: 431g
- ISBN-13: 9781138197336
- ISBN-10: 1138197335
- Artikelnr.: 50154499
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Dan Shoemaker, PhD, is principal investigator and senior research scientist at the University of Detroit Mercy's Center for Cyber Security and Intelligence Studies. Dan has served 30 years as a professor at UDM with 25 of those years as department chair. He served as a co-chair for both the Workforce Training and Education and the Software and Supply Chain Assurance Initiatives for the Department of Homeland Security, and was a subject matter expert for the NICE Workforce Framework 2.0. Dan has coauthored six books in the field of cybersecurity and has authored over one hundred journal publications. Dan earned his PhD from the University of Michigan. Ken Sigler is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills campus of Oakland Community College in Michigan. His primary research is in the areas of software management, software assurance, and cloud computing. He developed the college's CIS program option entitled "Information Technologies for Homeland Security." Until 2007, Ken served as the liaison for the college to the International Cybersecurity Education Coalition (ICSEC), of which he is one of three founding members. Ken is a member of IEEE, the Distributed Management Task Force (DMTF), and the Association for Information Systems (AIS). Anne Kohnke, PhD, is an assistant professor of IT at Lawrence Technological University and teaches courses in both the information technology and organization development/change management disciplines at the bachelor through doctorate levels. Anne started as an adjunct professor in 2002 and joined the faculty full-time in 2011. Her research focus is in the areas of cybersecurity, risk management, and IT governance. Anne started her IT career in the mid-1980s on a help desk, and over the years developed technical proficiency as a database administrator, network administrator, systems analyst, and technical project manager. After a decade, Anne was promoted to management and worked as an IT Director, Vice President of IT and Chief Information Security Officer (CISO). Anne earned her PhD from Benedictine University.
What Product Risk Is and Why It Needs to be Managed. The Three
Constituencies of Product Trust. Building a Standard Acquisition
Infrastructure. Risk Management in the ICT Product Chain. Control
Formulation and Implementation. Control Sustainment and Operational
Assurance. A Capability Maturity Model for Secure Product Acquisition.
Constituencies of Product Trust. Building a Standard Acquisition
Infrastructure. Risk Management in the ICT Product Chain. Control
Formulation and Implementation. Control Sustainment and Operational
Assurance. A Capability Maturity Model for Secure Product Acquisition.
What Product Risk Is and Why It Needs to be Managed. The Three
Constituencies of Product Trust. Building a Standard Acquisition
Infrastructure. Risk Management in the ICT Product Chain. Control
Formulation and Implementation. Control Sustainment and Operational
Assurance. A Capability Maturity Model for Secure Product Acquisition.
Constituencies of Product Trust. Building a Standard Acquisition
Infrastructure. Risk Management in the ICT Product Chain. Control
Formulation and Implementation. Control Sustainment and Operational
Assurance. A Capability Maturity Model for Secure Product Acquisition.