Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             12 results found
no title author magazine year volume issue page(s) type
1 A vendor's view Greenland, John
1996
1 3 p. 29-32
4 p.
article
2 Information security standards for outsourcing Pepper, Bill
1996
1 3 p. 59-61
3 p.
article
3 Introduction Hardy, Gary
1996
1 3 p. 1-2
2 p.
article
4 Obtaining assurance about your security Pepper, Bill
1996
1 3 p. 38-47
10 p.
article
5 Outsourcing — A legal perspective on contract critical success factors Honess, Sandra
1996
1 3 p. 57-58
2 p.
article
6 Outsourcing — The major legal issues 1996
1 3 p. 51-56
6 p.
article
7 Report highlights 1996
1 3 p. 3-7
5 p.
article
8 Security considerations in outsourcing IT services Blackley, John A.
1996
1 3 p. 11-17
7 p.
article
9 Security service level agreements for outsourced security functions Pepper, Bill
1996
1 3 p. 48-50
3 p.
article
10 The risk of allowing outside staff access to your information systems Peltier, Tom
1996
1 3 p. 18-28
11 p.
article
11 Trends in outsourcing Pepper, Bill
1996
1 3 p. 8-10
3 p.
article
12 You can outsource many activities but not fraud! Iyer, Nigel K.
1996
1 3 p. 33-37
5 p.
article
                             12 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands