nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A vendor's view
|
Greenland, John |
|
1996 |
1 |
3 |
p. 29-32 4 p. |
artikel |
2 |
Information security standards for outsourcing
|
Pepper, Bill |
|
1996 |
1 |
3 |
p. 59-61 3 p. |
artikel |
3 |
Introduction
|
Hardy, Gary |
|
1996 |
1 |
3 |
p. 1-2 2 p. |
artikel |
4 |
Obtaining assurance about your security
|
Pepper, Bill |
|
1996 |
1 |
3 |
p. 38-47 10 p. |
artikel |
5 |
Outsourcing — A legal perspective on contract critical success factors
|
Honess, Sandra |
|
1996 |
1 |
3 |
p. 57-58 2 p. |
artikel |
6 |
Outsourcing — The major legal issues
|
|
|
1996 |
1 |
3 |
p. 51-56 6 p. |
artikel |
7 |
Report highlights
|
|
|
1996 |
1 |
3 |
p. 3-7 5 p. |
artikel |
8 |
Security considerations in outsourcing IT services
|
Blackley, John A. |
|
1996 |
1 |
3 |
p. 11-17 7 p. |
artikel |
9 |
Security service level agreements for outsourced security functions
|
Pepper, Bill |
|
1996 |
1 |
3 |
p. 48-50 3 p. |
artikel |
10 |
The risk of allowing outside staff access to your information systems
|
Peltier, Tom |
|
1996 |
1 |
3 |
p. 18-28 11 p. |
artikel |
11 |
Trends in outsourcing
|
Pepper, Bill |
|
1996 |
1 |
3 |
p. 8-10 3 p. |
artikel |
12 |
You can outsource many activities but not fraud!
|
Iyer, Nigel K. |
|
1996 |
1 |
3 |
p. 33-37 5 p. |
artikel |