Supply Chain Risk Management

Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

Business & Finance, Industries & Professions, Purchasing & Buying, Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems
Cover of the book Supply Chain Risk Management by Ken Sigler, Anne Kohnke, Dan Shoemaker, CRC Press
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Ken Sigler, Anne Kohnke, Dan Shoemaker ISBN: 9781315279558
Publisher: CRC Press Publication: November 7, 2017
Imprint: Auerbach Publications Language: English
Author: Ken Sigler, Anne Kohnke, Dan Shoemaker
ISBN: 9781315279558
Publisher: CRC Press
Publication: November 7, 2017
Imprint: Auerbach Publications
Language: English

The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization. It details a capability maturity development process that will install an increasingly competent process and an attendant set of activities and tasks within the technology acquisition process. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization. It details a capability maturity development process that will install an increasingly competent process and an attendant set of activities and tasks within the technology acquisition process. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems.

More books from CRC Press

Cover of the book Collaborative Cyber Threat Intelligence by Ken Sigler, Anne Kohnke, Dan Shoemaker
Cover of the book Handbook of Particle Physics by Ken Sigler, Anne Kohnke, Dan Shoemaker
Cover of the book A Practical Guide to Alterations and Improvements by Ken Sigler, Anne Kohnke, Dan Shoemaker
Cover of the book Superconductivity of Metals and Cuprates by Ken Sigler, Anne Kohnke, Dan Shoemaker
Cover of the book The Technology of Building Defects by Ken Sigler, Anne Kohnke, Dan Shoemaker
Cover of the book Elementary Mathematical and Computational Tools for Electrical and Computer Engineers Using MATLAB by Ken Sigler, Anne Kohnke, Dan Shoemaker
Cover of the book Wear of Rock Cutting Tools by Ken Sigler, Anne Kohnke, Dan Shoemaker
Cover of the book International Approaches to Real Estate Development by Ken Sigler, Anne Kohnke, Dan Shoemaker
Cover of the book Removing the Barriers to Global Health Equity by Ken Sigler, Anne Kohnke, Dan Shoemaker
Cover of the book Nutritional Aspects Of Aging by Ken Sigler, Anne Kohnke, Dan Shoemaker
Cover of the book Synthetic Aperture Radar Processing by Ken Sigler, Anne Kohnke, Dan Shoemaker
Cover of the book The Stannic Oxide Gas SensorPrinciples and Applications by Ken Sigler, Anne Kohnke, Dan Shoemaker
Cover of the book Social Networks with Rich Edge Semantics (Open Access) by Ken Sigler, Anne Kohnke, Dan Shoemaker
Cover of the book How Drugs Work by Ken Sigler, Anne Kohnke, Dan Shoemaker
Cover of the book Advanced Signal Processing Handbook by Ken Sigler, Anne Kohnke, Dan Shoemaker
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy