000 01106 a2200217 4500
003 Nust
005 20220725182547.0
010 _a 2004052956
020 _a1580535313 (alk. paper)
040 _cNust
082 0 0 _a005.8,AXE
100 1 _aAxelrod, C. Warren.
_995047
245 1 0 _aOutsourcing information security /
_cC. Warren Axelrod.
260 _aBoston :
_bArtech House,
_cc2004.
300 _axxvi, 248 p. :
_bill. ;
_c24 cm.
505 _aOutsourcing Information Security (Page-1), Information Security Risks (Page-11), Justifying Outsourcing (Page-27), Risks Of Outsourcing (Page-49), Categorizing Costs And Benefits (Page-71), Costs And Benefits Throughout The Evaluation Process (Page-85), The Outsourcing Evaluation Process (Page- 107), Outsourcing Security Functions And Security Considerations When Outsourcing (Page-131), Summery Of The Outsourcing Process (Page-163).
650 0 _aComputer networks
_xSecurity measures
_zUnited States.
_995048
650 0 _aComputers
_xAccess control
_zUnited States.
_995049
650 0 _aData encryption (Computer science).
_929166
942 _cREF
_2ddc
999 _c175301
_d175301