To see the other types of publications on this topic, follow the link: Information Security Management System (ISMS).

Books on the topic 'Information Security Management System (ISMS)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Information Security Management System (ISMS).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Chopra, Abhishek, and Mukund Chaudhary. Implementing an Information Security Management System. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5413-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

), National Institute of Standards and Technology (U S. Security requirements for cryptographic modules. Computer Systems Laboratory, National Institute of Standards and Technology, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Montana. Legislature. Legislative Audit Division. Datacenter security, Montana Department of Transportation: Information system audit. Legislative Audit Division, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chinhŭngwŏn, Hanʼguk Chŏngbo Poho, ред. Chŏngbo poho sisŭtʻem pʻyŏngka, injŭng gaidŭ =: Information security system evaluation & certification guide. Hanʼguk Chŏngbo Poho Chinhŭngwŏn, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States. Department of Homeland Security. Office of Inspector General. Information sharing with fusion centers has improved, but information system challenges remain. Dept. of Homeland Security, Office of Inspector General, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

United States. Department of Homeland Security. Office of Inspector General. Review of DHS component plans of action and milestones for financial system security. U.S. Dept. of Homeland Security, Office of Inspector General, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ernesto, Damiani, Maciaszek Leszek, Missikoff Michele, Parkin Michael, and SpringerLink (Online service), eds. Business System Management and Engineering: From Open Issues to Applications. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Division, Montana Legislature Legislative Audit. Management information and cost recovery system: Claims processing, Department of Public Health and Human Services : information systems audit. Legislative Audit Division, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Montana. Legislature. Legislative Audit Division. Management information and cost recovery system: Claims processing, Department of Public Health and Human Services : information systems audit. Legislative Audit Division, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pearson, Siani. Privacy and Security for Cloud Computing. Springer London, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

United States. Department of Homeland Security. Office of Inspector General. Additional controls can enhance the security of the automated commercial environment system. U.S. Dept. of Homeland Security, Office of Inspector General, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Guozhen, Fan, and Ke xue ji shu zi liao zhong xin., eds. Zi xun an quan guan li xi tong yu ji he: Information security management system and audit. Xing zheng yuan guo jia ke xue wei yuan hui ke xue ji shu zi liao zhong xin, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Montana. Legislature. Legislative Audit Division. Integrated Revenue Information System: Processing of individual income and corporate tax records, Department of Revenue : information systems audit. Legislative Audit Division, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Montana. Legislature. Legislative Audit Division. Integrated Revenue Information System: Processing of individual income and corporate tax records, Department of Revenue : information systems audit. Legislative Audit Division, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Brock, Jack L. Governmentwide initiatives: Critical issues facing the post-FTS 2000 program : statement of Jack L. Brock, Jr., Director, Information Resources Management/National Security and International Affairs, Accounting and Information Management Division, before the Subcommittee on Government Management, Information, and Technology, Committee on Government Reform and Oversight, House of Representatives. The Office, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

United States. Congress. House. Committee on Government Reform. No computer system left behind: A review of the federal government's D+ information security grade : hearing before the Committee on Government Reform, House of Representatives, One Hundred Ninth Congress, first session, April 7, 2005. U.S. G.P.O., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Institute, SAS, ed. SAS 9.1.3 intelligence platform: System administration guide. SAS Pub., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Pohlman, Marlin B. Oracle Identity Management. Taylor and Francis, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Office, General Accounting. Information technology: Homeland Security needs to improve entry exit system expenditure planning : report to congressional committees. The Office, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

David, Hutchison. Resilient Networks and Services: Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedings. Springer-Verlag Berlin Heidelberg, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

López, Javier. Network and System Security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

International Baltic Conference on Databases and Information Systems (9th 2010 Ri ga, Latvia). Databases and information systems VI: Selected papers from the Ninth International Baltic Conference, DB & IS 2010. IOS Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Division, Montana Legislature Legislative Audit. Consolidated environmental data access and retrieval system: Verification of data accuracy and integrity, Department of Environmental Quality : information systems audit. Legislative Audit Division, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Montana. Legislature. Legislative Audit Division. Consolidated environmental data access and retrieval system: Verification of data accuracy and integrity, Department of Environmental Quality : information systems audit. Legislative Audit Division, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Pohlman, Marlin B. Oracle identity management: Governance, risk, and compliance architecture. 3rd ed. Auerbach Publications, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Institute, SAS, ed. SAS 9.1.3 intelligence platform: Security administration guide. 2nd ed. SAS Pub., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ou, Xinming. Quantitative security risk assessment of enterprise networks. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Novosel'cev, Viktor, Sergey Kochedykov, Dar'ya Orlova, Kirill Plyuschik, L. Rossihina, and I. Goncharov. Conflict-active project management for the development of information security systems of infocommunication networks. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1921360.

Full text
Abstract:
The object of study in the monograph is the conflict "information security system of infocommunication networks of critical socio-economic infrastructure objects — an attacker (criminal element)". The subject of the research is the development of a methodology for conflict-active project management for the development of information security systems for these networks, including models for supporting project decision-making. The theoretical basis of the above is the provisions of system analysis, the theory of management and decision-making, the theory of active systems, the theory of informat
APA, Harvard, Vancouver, ISO, and other styles
29

Stephen, Wolthusen, and SpringerLink (Online service), eds. Critical Information Infrastructures Security: 5th International Workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010. Revised Papers. Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Malik, Zaki. Trust Management for Service-Oriented Environments. Springer-Verlag US, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Scholz, James A. Enterprise architecture and information assurance: Developing a secure foundation. CRC Press/Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Aging, United States Congress Senate Special Committee on. SSA's toll-free telephone system: Service or disservice? : hearing before the Special Committee on Aging, United States Senate, One Hundred First Congress, first session, Washington, DC, April 10, 1989. U.S. G.P.O., 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Aging, United States Congress Senate Special Committee on. SSA's toll-free telephone system: Service or disservice? : hearing before the Special Committee on Aging, United States Senate, One Hundred First Congress, first session, Washington, DC, April 10, 1989. U.S. G.P.O., 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Aging, United States Congress Senate Special Committee on. SSA's toll-free telephone system: Service or disservice? : hearing before the Special Committee on Aging, United States Senate, One Hundred First Congress, first session, Washington, DC, April 10, 1989. U.S. G.P.O., 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

United States. Congress. Senate. Special Committee on Aging. SSA's toll-free telephone system: Service or disservice? : hearing before the Special Committee on Aging, United States Senate, One Hundred First Congress, first session, Washington, DC, April 10, 1989. U.S. G.P.O., 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

United States. Congress. Senate. Special Committee on Aging. SSA's toll-free telephone system: Service or disservice? : hearing before the Special Committee on Aging, United States Senate, One Hundred First Congress, first session, Washington, DC, April 10, 1989. U.S. G.P.O., 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Office, General Accounting. VA information systems: Computer security weaknesses persist at the Veterans Health Administration : report to the Acting Secretary of Veterans Affairs. The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Office, General Accounting. Information system: Opportunities exist to strengthen SEC's oversight of capacity and security : report to the Ranking Minority Member, Committee on Energy and Commerce, House of Representatives. GAO, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Brock, Jack L. Earth Observing System: Concentration on near-term EOSDIS development may jeopardize long-term success : statement of Jack L. Brock, Jr., Director, Information Resources Management/National Security and International Affairs, Accounting and Information Management Division, before the Subcommittee on Space and Aeronautics, Committee on Science, House of Representatives. The Office, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Kim, Tai-hoon. Computer Applications for Security, Control and System Engineering: International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Frisch, AEleen. Essential System Administration. O'Reilly & Associates, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Frisch, AEleen. Essential System Administration. 2nd ed. O’Reilly & Associates, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Frisch, AEleen. Essential System Administration. Edited by Loukides Mike. O’Reilly & Associates, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Mayer, Nicolas. Model-based Management of Information System Security Risk. Presses universitaires de Namur, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Chaudhary, Mukund, and Abhishek Chopra. Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines. Apress, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Boyce, Joseph George. A model for the development of an organization's information system (IS) security system. 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Implementing the ISO/IEC 27001 Information Security Management System Standard. Artech House Publishers, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Constable, William. Developing a Risk Management System for Information: Systems Security Incidents. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Blokdyk, Gerardus. Security Management Information System: The Ultimate Step-By-Step Guide. Createspace Independent Publishing Platform, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Rountree, Derrick. Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts. Elsevier Science & Technology Books, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!