Books on the topic 'Information security, information security management system, ISMS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Information security, information security management system, ISMS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Chopra, Abhishek, and Mukund Chaudhary. Implementing an Information Security Management System. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5413-4.
Full text), National Institute of Standards and Technology (U S. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textComputer Systems Laboratory (U.S.), ed. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textSecurity for Microsoft Windows system administrators: Introduction to key information security concepts. Amsterdam: Syngress, 2011.
Find full textMontana. Legislature. Legislative Audit Division. Datacenter security, Montana Department of Transportation: Information system audit. [Helena, Mont: Legislative Audit Division, 2005.
Find full textPresident's Council on Integrity and Efficiency (U.S.), ed. Model framework for management control over automated information system. Washington, D.C: Executive Office of the President, Office of Management and Budget, 1988.
Find full textP, Shim J., and SpringerLink (Online service), eds. Wireless Technology: Applications, Management, and Security. Boston, MA: Springer-Verlag US, 2009.
Find full textOrganizational, legal, and technological dimensions of information system administration. Hershey, PA: Information Science Reference, 2014.
Find full textPearson, Siani. Privacy and Security for Cloud Computing. London: Springer London, 2013.
Find full textNo computer system left behind: A review of the 2005 federal computer security scorecards : hearing before the Committee on Government Reform, House of Representatives, One Hundred Ninth Congress, second session, March 16, 2006. Washington: U.S. G.P.O., 2006.
Find full textUnited States. Congress. House. Committee on Government Reform. No computer system left behind: A review of the federal government's D+ information security grade : hearing before the Committee on Government Reform, House of Representatives, One Hundred Ninth Congress, first session, April 7, 2005. Washington: U.S. G.P.O., 2005.
Find full textDavid, Hutchison. Resilient Networks and Services: Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.
Find full textDivision, Montana Legislature Legislative Audit. Management information and cost recovery system: Claims processing, Department of Public Health and Human Services : information systems audit. Helena, Mont: Legislative Audit Division, 2009.
Find full textMontana. Legislature. Legislative Audit Division. Management information and cost recovery system: Claims processing, Department of Public Health and Human Services : information systems audit. Helena, Mont: Legislative Audit Division, 2009.
Find full textMontana. Legislature. Legislative Audit Division. Integrated Revenue Information System: Processing of individual income and corporate tax records, Department of Revenue : information systems audit. Helena, Mont: Legislative Audit Division, 2009.
Find full textMontana. Legislature. Legislative Audit Division. Integrated Revenue Information System: Processing of individual income and corporate tax records, Department of Revenue : information systems audit. Helena, Mont: Legislative Audit Division, 2009.
Find full textOffice, General Accounting. Information technology: Homeland Security needs to improve entry exit system expenditure planning : report to congressional committees. [Washington, D.C.]: The Office, 2003.
Find full textBrock, Jack L. Governmentwide initiatives: Critical issues facing the post-FTS 2000 program : statement of Jack L. Brock, Jr., Director, Information Resources Management/National Security and International Affairs, Accounting and Information Management Division, before the Subcommittee on Government Management, Information, and Technology, Committee on Government Reform and Oversight, House of Representatives. Washington, D.C: The Office, 1995.
Find full textLópez, Javier. Network and System Security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Find full textStephen, Wolthusen, and SpringerLink (Online service), eds. Critical Information Infrastructures Security: 5th International Workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010. Revised Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.
Find full textMeeting the challenge: Are missed opportunities costing us money? : hearing before the Federal Financial Management, Government Information, Federal Services, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Tenth Congress, first session, June 28, 2007. Washington: U.S. G.P.O., 2008.
Find full textErnesto, Damiani, Maciaszek Leszek, Missikoff Michele, Parkin Michael, and SpringerLink (Online service), eds. Business System Management and Engineering: From Open Issues to Applications. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textInternational Baltic Conference on Databases and Information Systems (9th 2010 Ri ga, Latvia). Databases and information systems VI: Selected papers from the Ninth International Baltic Conference, DB & IS 2010. Amsterdam: IOS Press, 2011.
Find full textDivision, Montana Legislature Legislative Audit. Consolidated environmental data access and retrieval system: Verification of data accuracy and integrity, Department of Environmental Quality : information systems audit. Helena, Mont: Legislative Audit Division, 2009.
Find full textMontana. Legislature. Legislative Audit Division. Consolidated environmental data access and retrieval system: Verification of data accuracy and integrity, Department of Environmental Quality : information systems audit. Helena, Mont: Legislative Audit Division, 2009.
Find full textOffice, General Accounting. VA information systems: Computer security weaknesses persist at the Veterans Health Administration : report to the Acting Secretary of Veterans Affairs. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.
Find full textAging, United States Congress Senate Special Committee on. SSA's toll-free telephone system: Service or disservice? : hearing before the Special Committee on Aging, United States Senate, One Hundred First Congress, first session, Washington, DC, April 10, 1989. Washington: U.S. G.P.O., 1989.
Find full textUnited States. Congress. Senate. Special Committee on Aging. SSA's toll-free telephone system: Service or disservice? : hearing before the Special Committee on Aging, United States Senate, One Hundred First Congress, first session, Washington, DC, April 10, 1989. Washington: U.S. G.P.O., 1989.
Find full textAging, United States Congress Senate Special Committee on. SSA's toll-free telephone system: Service or disservice? : hearing before the Special Committee on Aging, United States Senate, One Hundred First Congress, first session, Washington, DC, April 10, 1989. Washington: U.S. G.P.O., 1989.
Find full textAging, United States Congress Senate Special Committee on. SSA's toll-free telephone system: Service or disservice? : hearing before the Special Committee on Aging, United States Senate, One Hundred First Congress, first session, Washington, DC, April 10, 1989. Washington: U.S. G.P.O., 1989.
Find full textUnited States. Congress. Senate. Special Committee on Aging. SSA's toll-free telephone system: Service or disservice? : hearing before the Special Committee on Aging, United States Senate, One Hundred First Congress, first session, Washington, DC, April 10, 1989. Washington: U.S. G.P.O., 1989.
Find full textKim, Tai-hoon. Computer Applications for Security, Control and System Engineering: International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textOffice, General Accounting. Information system: Opportunities exist to strengthen SEC's oversight of capacity and security : report to the Ranking Minority Member, Committee on Energy and Commerce, House of Representatives. Washington, D.C: GAO, 2001.
Find full text1945-, Rabe Gerhard, European Workshop on Industrial Computer Systems. TC7--Systems Reliability, Safety, and Security., and Institute for Systems Engineering and Informatics (Commission of the European Communities. Joint Research Centre), eds. SAFECOMP '95, the 14th International Conference on Computer Safety, Reliability, and Security, Belgirate, Italy, 11-13 October 1995. Berlin: Springer, 1995.
Find full textBrock, Jack L. Earth Observing System: Concentration on near-term EOSDIS development may jeopardize long-term success : statement of Jack L. Brock, Jr., Director, Information Resources Management/National Security and International Affairs, Accounting and Information Management Division, before the Subcommittee on Space and Aeronautics, Committee on Science, House of Representatives. Washington, D.C: The Office, 1995.
Find full textMalik, Zaki. Trust Management for Service-Oriented Environments. Boston, MA: Springer-Verlag US, 2009.
Find full textOffice, General Accounting. Information technology: Architecture needed to guide NASA's financial management modernization : report to congressional requesters. Washington, D.C. (P.O. Box 37050, Washington 20013): U.S. General Accounting Office, 2003.
Find full textOffice, General Accounting. Homeland security: Communication protocols and risk communication principles can assist in refining the advisory system : report to congressional requesters. Washington, D.C: U.S. General Accounting Office, 2004.
Find full textGladyshev, Pavel. Digital Forensics and Cyber Crime: Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textOffice, General Accounting. ADP acquisition: Army Civilian Personnel System : fact sheet for the chairman, Subcommittee on Legislation and National Security, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1989.
Find full textOffice, General Accounting. Information technology: Exceutive Office for U.S. Attorneys needs to institutionalize key IT management disciplines : report to congressional requesters. [Washington, D.C.]: The Office, 2003.
Find full textOffice, General Accounting. Air traffic control: Improved cost information needed to make billion dollar modernization investment decisions : report to the Secretary of Transportation. Washington, D.C: The Office, 1997.
Find full textOffice, General Accounting. Information technology: Justice plans to improve oversight of agency projects : report to congressional requesters. Washington, D.C: U.S. GAO, 2002.
Find full textOffice, General Accounting. ADP acquisition: Air Force logistics system modernization projects : report to the Honorable John Conyers, Jr., chairman, Legislation and National Security Subcommittee, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1989.
Find full textOffice, General Accounting. Information technology: Enterprise architecture use across the federal government can be improved : report to congressional committees. Washington, D.C: The Office, 2002.
Find full textChaudhary, Mukund, and Abhishek Chopra. Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines. Apress, 2019.
Find full textImplementing the ISO/IEC 27001 Information Security Management System Standard. Artech House Publishers, 2007.
Find full textSecurity Design Consulting The Business Of Security System Design. Butterworth-Heinemann, 2007.
Find full textBoyce, Joseph George. A model for the development of an organization's information system (IS) security system. 1986.
Find full textMerrill, Warkentin, and Vaughn Rayford 1947-, eds. Enterprise information systems assurance and system security: Managerial and technical issues. Hershey, PA: Idea Group Pub., 2006.
Find full text