Scan barcode
![Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Technology Product by Dan Shoemaker, Ken Sigler, Anne Kohnke](https://558130.bdp32.group/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsibWVzc2FnZSI6IkJBaHBCUGFJRlFFPSIsImV4cCI6bnVsbCwicHVyIjoiYmxvYl9pZCJ9fQ==--7b73972d4a57fb502b3aa4caa55ca72d6ce96b2f/eyJfcmFpbHMiOnsibWVzc2FnZSI6IkJBaDdCem9MWm05eWJXRjBTU0lJYW5CbkJqb0dSVlE2RkhKbGMybDZaVjkwYjE5c2FXMXBkRnNIYVFJc0FXa0M5QUU9IiwiZXhwIjpudWxsLCJwdXIiOiJ2YXJpYXRpb24ifX0=--038335c90cf75c275ae4d36968ac417dc4a0a3e3/Supply%20Chain%20Risk%20Management-%20Applying%20Secure%20Acquisition%20Principles%20to%20Ensure%20a%20Trusted%20Technology%20Product.jpg)
302 pages • missing pub info (editions)
ISBN/UID: 9781138197336
Format: Paperback
Language: English
Publisher: Auerbach Publications
Publication date: 05 November 2017
Description
The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how ...
Community Reviews
Content Warnings
![Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Technology Product by Dan Shoemaker, Ken Sigler, Anne Kohnke](https://558130.bdp32.group/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsibWVzc2FnZSI6IkJBaHBCUGFJRlFFPSIsImV4cCI6bnVsbCwicHVyIjoiYmxvYl9pZCJ9fQ==--7b73972d4a57fb502b3aa4caa55ca72d6ce96b2f/eyJfcmFpbHMiOnsibWVzc2FnZSI6IkJBaDdCem9MWm05eWJXRjBTU0lJYW5CbkJqb0dSVlE2RkhKbGMybDZaVjkwYjE5c2FXMXBkRnNIYVFJc0FXa0M5QUU9IiwiZXhwIjpudWxsLCJwdXIiOiJ2YXJpYXRpb24ifX0=--038335c90cf75c275ae4d36968ac417dc4a0a3e3/Supply%20Chain%20Risk%20Management-%20Applying%20Secure%20Acquisition%20Principles%20to%20Ensure%20a%20Trusted%20Technology%20Product.jpg)
302 pages • missing pub info (editions)
ISBN/UID: 9781138197336
Format: Paperback
Language: English
Publisher: Auerbach Publications
Publication date: 05 November 2017
Description
The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how ...