{"id":15121,"date":"2018-10-04T14:00:20","date_gmt":"2018-10-04T17:00:20","guid":{"rendered":"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=15121"},"modified":"2018-10-04T12:56:45","modified_gmt":"2018-10-04T15:56:45","slug":"supply-chain-risk-management","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/supply-chain-risk-management\/","title":{"rendered":"Supply Chain Risk Management"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-15122\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2018\/10\/supply-chain-risk-management.jpg\" alt=\"Supply Chain Risk Management\" width=\"145\" height=\"219\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2018\/10\/supply-chain-risk-management.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2018\/10\/supply-chain-risk-management-99x150.jpg 99w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Ken Sigler, Dan Shoemaker, Anne Kohnke<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Maison d&#8217;\u00e9dition Auerbach Publications<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by the organization. It details a capability maturity development process that will install an increasingly competent process and an attendant set of activities and tasks within the technology acquisition process. It defines a complete and correct set of processes, activities, tasks and monitoring and reporting systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ken Sigler, Dan Shoemaker, Anne Kohnke Maison d&#8217;\u00e9dition Auerbach Publications R\u00e9sum\u00e9: The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply chain and how to build auditable trust into the products and services acquired by&hellip; <\/p>\n","protected":false},"author":3,"featured_media":15122,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,6,19],"tags":[],"class_list":["post-15121","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-livros","category-risco-e-perdas"],"views":262,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/15121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=15121"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/15121\/revisions"}],"predecessor-version":[{"id":15123,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/15121\/revisions\/15123"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/15122"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=15121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=15121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=15121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}