Books on the topic 'Information Security Management System (ISMS)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Information Security Management System (ISMS).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Chopra, Abhishek, and Mukund Chaudhary. Implementing an Information Security Management System. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5413-4.
Full text), National Institute of Standards and Technology (U S. Security requirements for cryptographic modules. Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textMontana. Legislature. Legislative Audit Division. Datacenter security, Montana Department of Transportation: Information system audit. Legislative Audit Division, 2005.
Find full textChinhŭngwŏn, Hanʼguk Chŏngbo Poho, ред. Chŏngbo poho sisŭtʻem pʻyŏngka, injŭng gaidŭ =: Information security system evaluation & certification guide. Hanʼguk Chŏngbo Poho Chinhŭngwŏn, 2004.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. Information sharing with fusion centers has improved, but information system challenges remain. Dept. of Homeland Security, Office of Inspector General, 2010.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. Review of DHS component plans of action and milestones for financial system security. U.S. Dept. of Homeland Security, Office of Inspector General, 2008.
Find full textErnesto, Damiani, Maciaszek Leszek, Missikoff Michele, Parkin Michael, and SpringerLink (Online service), eds. Business System Management and Engineering: From Open Issues to Applications. Springer Berlin Heidelberg, 2012.
Find full textDivision, Montana Legislature Legislative Audit. Management information and cost recovery system: Claims processing, Department of Public Health and Human Services : information systems audit. Legislative Audit Division, 2009.
Find full textMontana. Legislature. Legislative Audit Division. Management information and cost recovery system: Claims processing, Department of Public Health and Human Services : information systems audit. Legislative Audit Division, 2009.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. Additional controls can enhance the security of the automated commercial environment system. U.S. Dept. of Homeland Security, Office of Inspector General, 2008.
Find full textGuozhen, Fan, and Ke xue ji shu zi liao zhong xin., eds. Zi xun an quan guan li xi tong yu ji he: Information security management system and audit. Xing zheng yuan guo jia ke xue wei yuan hui ke xue ji shu zi liao zhong xin, 2003.
Find full textMontana. Legislature. Legislative Audit Division. Integrated Revenue Information System: Processing of individual income and corporate tax records, Department of Revenue : information systems audit. Legislative Audit Division, 2009.
Find full textMontana. Legislature. Legislative Audit Division. Integrated Revenue Information System: Processing of individual income and corporate tax records, Department of Revenue : information systems audit. Legislative Audit Division, 2009.
Find full textBrock, Jack L. Governmentwide initiatives: Critical issues facing the post-FTS 2000 program : statement of Jack L. Brock, Jr., Director, Information Resources Management/National Security and International Affairs, Accounting and Information Management Division, before the Subcommittee on Government Management, Information, and Technology, Committee on Government Reform and Oversight, House of Representatives. The Office, 1995.
Find full textUnited States. Congress. House. Committee on Government Reform. No computer system left behind: A review of the federal government's D+ information security grade : hearing before the Committee on Government Reform, House of Representatives, One Hundred Ninth Congress, first session, April 7, 2005. U.S. G.P.O., 2005.
Find full textInstitute, SAS, ed. SAS 9.1.3 intelligence platform: System administration guide. SAS Pub., 2006.
Find full textOffice, General Accounting. Information technology: Homeland Security needs to improve entry exit system expenditure planning : report to congressional committees. The Office, 2003.
Find full textDavid, Hutchison. Resilient Networks and Services: Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedings. Springer-Verlag Berlin Heidelberg, 2008.
Find full textLópez, Javier. Network and System Security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. Springer Berlin Heidelberg, 2013.
Find full textInternational Baltic Conference on Databases and Information Systems (9th 2010 Ri ga, Latvia). Databases and information systems VI: Selected papers from the Ninth International Baltic Conference, DB & IS 2010. IOS Press, 2011.
Find full textDivision, Montana Legislature Legislative Audit. Consolidated environmental data access and retrieval system: Verification of data accuracy and integrity, Department of Environmental Quality : information systems audit. Legislative Audit Division, 2009.
Find full textMontana. Legislature. Legislative Audit Division. Consolidated environmental data access and retrieval system: Verification of data accuracy and integrity, Department of Environmental Quality : information systems audit. Legislative Audit Division, 2009.
Find full textPohlman, Marlin B. Oracle identity management: Governance, risk, and compliance architecture. 3rd ed. Auerbach Publications, 2008.
Find full textInstitute, SAS, ed. SAS 9.1.3 intelligence platform: Security administration guide. 2nd ed. SAS Pub., 2006.
Find full textOu, Xinming. Quantitative security risk assessment of enterprise networks. Springer, 2012.
Find full textNovosel'cev, Viktor, Sergey Kochedykov, Dar'ya Orlova, Kirill Plyuschik, L. Rossihina, and I. Goncharov. Conflict-active project management for the development of information security systems of infocommunication networks. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1921360.
Full textStephen, Wolthusen, and SpringerLink (Online service), eds. Critical Information Infrastructures Security: 5th International Workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010. Revised Papers. Springer Berlin Heidelberg, 2011.
Find full textMalik, Zaki. Trust Management for Service-Oriented Environments. Springer-Verlag US, 2009.
Find full textScholz, James A. Enterprise architecture and information assurance: Developing a secure foundation. CRC Press/Taylor & Francis Group, 2014.
Find full textAging, United States Congress Senate Special Committee on. SSA's toll-free telephone system: Service or disservice? : hearing before the Special Committee on Aging, United States Senate, One Hundred First Congress, first session, Washington, DC, April 10, 1989. U.S. G.P.O., 1989.
Find full textAging, United States Congress Senate Special Committee on. SSA's toll-free telephone system: Service or disservice? : hearing before the Special Committee on Aging, United States Senate, One Hundred First Congress, first session, Washington, DC, April 10, 1989. U.S. G.P.O., 1989.
Find full textAging, United States Congress Senate Special Committee on. SSA's toll-free telephone system: Service or disservice? : hearing before the Special Committee on Aging, United States Senate, One Hundred First Congress, first session, Washington, DC, April 10, 1989. U.S. G.P.O., 1989.
Find full textUnited States. Congress. Senate. Special Committee on Aging. SSA's toll-free telephone system: Service or disservice? : hearing before the Special Committee on Aging, United States Senate, One Hundred First Congress, first session, Washington, DC, April 10, 1989. U.S. G.P.O., 1989.
Find full textUnited States. Congress. Senate. Special Committee on Aging. SSA's toll-free telephone system: Service or disservice? : hearing before the Special Committee on Aging, United States Senate, One Hundred First Congress, first session, Washington, DC, April 10, 1989. U.S. G.P.O., 1989.
Find full textOffice, General Accounting. VA information systems: Computer security weaknesses persist at the Veterans Health Administration : report to the Acting Secretary of Veterans Affairs. The Office, 2000.
Find full textOffice, General Accounting. Information system: Opportunities exist to strengthen SEC's oversight of capacity and security : report to the Ranking Minority Member, Committee on Energy and Commerce, House of Representatives. GAO, 2001.
Find full textBrock, Jack L. Earth Observing System: Concentration on near-term EOSDIS development may jeopardize long-term success : statement of Jack L. Brock, Jr., Director, Information Resources Management/National Security and International Affairs, Accounting and Information Management Division, before the Subcommittee on Space and Aeronautics, Committee on Science, House of Representatives. The Office, 1995.
Find full textKim, Tai-hoon. Computer Applications for Security, Control and System Engineering: International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textFrisch, AEleen. Essential System Administration. 2nd ed. O’Reilly & Associates, 1993.
Find full textFrisch, AEleen. Essential System Administration. Edited by Loukides Mike. O’Reilly & Associates, 1993.
Find full textMayer, Nicolas. Model-based Management of Information System Security Risk. Presses universitaires de Namur, 2012.
Find full textChaudhary, Mukund, and Abhishek Chopra. Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines. Apress, 2019.
Find full textBoyce, Joseph George. A model for the development of an organization's information system (IS) security system. 1986.
Find full textImplementing the ISO/IEC 27001 Information Security Management System Standard. Artech House Publishers, 2007.
Find full textConstable, William. Developing a Risk Management System for Information: Systems Security Incidents. Independently Published, 2018.
Find full textBlokdyk, Gerardus. Security Management Information System: The Ultimate Step-By-Step Guide. Createspace Independent Publishing Platform, 2018.
Find full textRountree, Derrick. Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts. Elsevier Science & Technology Books, 2011.
Find full text