Supply chain risk management : applying secure acquisition principles to ensure a trusted technology product /

Sigler, Ken

Supply chain risk management : applying secure acquisition principles to ensure a trusted technology product / Ken Sigler, Dan Shoemaker, Anne Kohnke. - xxiv, 278 pages : illustrations ; 24 cm. - Internal audit and IT audit .

Foreword -- Why secure information and communication technology (ICT) product acquisition matters -- Building a standard acquisition infrastructure -- The three building blocks for creating communities of trust -- Risk management in the ICT product chain -- Establishing a substantive control process -- Control sustainment and operational assurance -- Building a capable supply chain operation.

9781138197350 9781138197336

2017030801


Business logistics.
Risk management.
Data protection.
Computer networks--Security measures.

HD38.5 / .K64 2018

658.7SIG

CUoM © 2026. Catholic University of Mbeya.
P.O. Box 2622, Mbeya, Tanzania.
Phone: +255 252 504 240 | library@cuom.ac.tz | info@cuom.ac.tz|
Powered by Koha. Installed, Configured, and Customized by CUoM Library Staff, Technical Section