no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A vendor's view
|
Greenland, John |
|
1996 |
1 |
3 |
p. 29-32 4 p. |
article |
2 |
Information security standards for outsourcing
|
Pepper, Bill |
|
1996 |
1 |
3 |
p. 59-61 3 p. |
article |
3 |
Introduction
|
Hardy, Gary |
|
1996 |
1 |
3 |
p. 1-2 2 p. |
article |
4 |
Obtaining assurance about your security
|
Pepper, Bill |
|
1996 |
1 |
3 |
p. 38-47 10 p. |
article |
5 |
Outsourcing — A legal perspective on contract critical success factors
|
Honess, Sandra |
|
1996 |
1 |
3 |
p. 57-58 2 p. |
article |
6 |
Outsourcing — The major legal issues
|
|
|
1996 |
1 |
3 |
p. 51-56 6 p. |
article |
7 |
Report highlights
|
|
|
1996 |
1 |
3 |
p. 3-7 5 p. |
article |
8 |
Security considerations in outsourcing IT services
|
Blackley, John A. |
|
1996 |
1 |
3 |
p. 11-17 7 p. |
article |
9 |
Security service level agreements for outsourced security functions
|
Pepper, Bill |
|
1996 |
1 |
3 |
p. 48-50 3 p. |
article |
10 |
The risk of allowing outside staff access to your information systems
|
Peltier, Tom |
|
1996 |
1 |
3 |
p. 18-28 11 p. |
article |
11 |
Trends in outsourcing
|
Pepper, Bill |
|
1996 |
1 |
3 |
p. 8-10 3 p. |
article |
12 |
You can outsource many activities but not fraud!
|
Iyer, Nigel K. |
|
1996 |
1 |
3 |
p. 33-37 5 p. |
article |