To see the other types of publications on this topic, follow the link: Information security standards.

Books on the topic 'Information security standards'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Information security standards.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Security: Technical security standards for information technology. Ontario, Canada: Royal Canadian Mounted Police, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Aalders, J. C. H. Handbook for information security: A guide towards information security standards. Amsterdam: North-Holland, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Landoll, Douglas J. Information Security Policies, Procedures, and Standards. Boca Raton, FL : CRC Press, 2016.: Auerbach Publications, 2017. http://dx.doi.org/10.1201/9781315372785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Information Security Policies, Procedures, and Standards. London: Taylor and Francis, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Torp, Jeffrey. Information security: Guidance, standards, and issuances. Austin, Tex: AlexInformation, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Information security policies, procedures, and standards: Guidelines for effective information security management. Boca Raton, FL: Auerbach, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kou, Weidong. Networking Security and Standards. Boston, MA: Springer US, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Information Technology Laboratory (National Institute of Standards and Technology). Standards for security categorization of federal information and information systems. Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sychev, Yuriy. Information protection and information security. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1013711.

Full text
Abstract:
The textbook is developed in accordance with current standards at a high methodological level and can be used to study the following subjects: "Fundamentals of information security", "Information security", "information Protection", "threats to information security", "Malware", "Antivirus programs", "Technology for building secure automated systems". Meets the requirements of Federal state educational standards of higher education of the latest generation. The material presented in the textbook is tested in the classroom and is intended for students studying in the direction of training 10.03.01 "Information security" (bachelor's level). It can also be used in preparation for admission to the master's program.
APA, Harvard, Vancouver, ISO, and other styles
10

Standard security label for information transfer. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Computer Systems Laboratory, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Longley, Dennis. Information security: Dictionary of concepts, standards and terms. Houndmills, Basingstoke: Macmillan, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Information security policies, procedures, and standards: A practitioner's reference. Boca Raton, FL: CRC Press, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Information Technology Laboratory (National Institute of Standards and Technology). Minimum security requirements for federal information and information systems. Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

), National Institute of Standards and Technology (U S. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Computer Systems Laboratory (U.S.), ed. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Watkins, Steve. An introduction to information security and ISO27001: A pocket guide. Cambridgeshire, UK: IT Governance Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Stoneburner, Gary. CSPP: Guidance for COTS security protection profiles (formerly: CS2-- protection profile guidance for near-term COTS). Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Managing HIPAA compliance: Standards for electronic transmission, privacy, and security of health information. Chicago, Ill: Health Administration Press, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Application security in the ISO27001 environment. Ely, U.K: IT Governance Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

name, No. Security standards for healthcare information systems: A perspective from the EU ISSI MEDSEC project. Amsterdam: IOS Press, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Stoneburner, Gary. Engineering principles for information technology security (a baseline for achieving security): Recommendations of the National Institute of Standards and Technology. Gaithersburg, Md: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Standardization, International Organization for. Information processing systems: Open systems interconnection, basic reference model. [Geneva, Switzerland?]: The Organzation, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Standardization, International Organization for. Information processing systems: Open systems interconnection, basic reference model. [Geneva, Switzerland?]: The Organization, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Standardization, International Organization for. Information processing systems: Open systems interconnection, basic reference model. [Geneva, Switzerland?]: The Organization, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Deluccia, James J. IT compliance and controls: Best practices for implementation. Hoboken, N.J: John Wiley & Sons, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

United States. Congress. House. Committee on Government Reform. Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census. Exploring common criteria: Can it assure that the federal government gets needed security in software? : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, September 17, 2003. Washington: U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Police, Royal Canadian Mounted. Technical security standards for information technology (TSSIT) =: Normes de sécurité technique dans le domaine de la technologie de l'information. Ottawa, Ont: Royal Canadian Mounted Police = Gendarmerie royale du Canada, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Security without obscurity: A guide to confidentiality, authentication, and integrity. Boca Raton, FL: CRC Press, Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Chuvakin, Anton. PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance. 2nd ed. Burlington: Elsevier, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Howland, Charles B. Balancing facility security against the broad public dissemination of facility-specific environmental information post 9/11. [Chicago?]: American Bar Association, Section on Environment, Energy, and Resources, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Polischuk, Yuriy, and Aleksandr Borovskiy. Databases and their security. ru: INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1011088.

Full text
Abstract:
The tutorial is devoted to the implementation of relational databases. Its purpose is to master the basic principles of design, implementation, maintenance and information security of databases. The manual includes tasks for laboratory work, control questions and tests for self-examination. Meets the requirements of the Federal state educational standards of higher education of the last generation. For students of higher educational institutions of all specialties and areas of training, interested in the design, implementation and security of databases.
APA, Harvard, Vancouver, ISO, and other styles
32

United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations. H.R. 3844, the Federal Information Security Management Act of 2002: Hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, second session on H.R. 3844 to strengthen federal government information security, including through the requirement for the development of mandatory information security risk management standards, May 2, 2002. Washington: U.S. G.P.O., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Blinovskaya, Yana, and Dar'ya Zadoya. Geoinformation systems in technosphere security. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1002663.

Full text
Abstract:
The textbook considers the specifics of the use of information technologies in technosphere security. The article describes the characteristics of software products used to solve problems in the areas of life safety, organization of industrial production and environmental protection. Meets the requirements of the federal state educational standards of higher education of the latest generation. For students studying in the enlarged group of training areas 20.00.00 "Technosphere safety and environmental management", as well as for students of related specialties studying the impact of industrial production on the environment and using GIS tools.
APA, Harvard, Vancouver, ISO, and other styles
34

United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, and International Security. An assessment of federal funding for private research and development: Hearing before the Federal Financial Management, Government Information, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Ninth Congress, first session, May 26, 2005. Washington: U.S. G.P.O., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Brock, Jack L. Impact of the governmentwide computer security planning and review process: Statement of Jack L. Brock, Jr., Director, Government Information and Financial Management Issues, Information Management and Technology Division, before the Subcommittee on Transportation, Aviation and Materials, Committee on Science, Space, and Technology, House of Representatives. [Washington, D.C.]: The Office, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Cloud computing: An overview of the technology and the issues facing American innovators : hearing before the Subcommittee on Intellectual Property, Competition, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Twelfth Congress, second session, July 25, 2012. Washington: U.S. G.P.O., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Bakolia, George. Assessment of agency compliance with enterprise security standards: As directed by session law 2003-153, section 1(a), general statute 147-33.82(el), 2003 session of the North Carolina General Assembly. United States]: Gartner, Inc., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Police, Royal Canadian Mounted. Technical security standard for information technology. Ottawa: Treasury Board, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Cybersecurity activities at NIST's Information Technology Laboratory: Hearing before the Subcommittee on Technology and Innovation, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, first session, October 22, 2009. Washington: U.S. G.P.O., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

United States. Government Accountability Office. Financial management: Challenges in meeting requirements of the improper payments information act : report to the Chairman, Subcommittee on Government Management, Finance, and Accountability, Committee on Government Reform, House of Representatives. Washington, D.C: GAO, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Russkevich, Evgeniy. Criminally-legal counteraction to crimes committed through the use of modern information and communication technologies. ru: INFRA-M Academic Publishing LLC., 2017. http://dx.doi.org/10.12737/24712.

Full text
Abstract:
The publication is devoted to the investigation of the criminal law aspects of countering crimes committed through the use of modern information and communication technologies (computers, information and communication networks, including the Internet). We analyze the current legislation, the theoretical development and practice in cases of information crimes. The manual complies with federal state educational standards of higher professional education in the field of "Law Enforcement", "Legal provision of national security" and "Jurisprudence".
APA, Harvard, Vancouver, ISO, and other styles
42

Subcommittee, United States Congress House Committee on Government Operaions Legislation and National Security. Computer Security Research and Training Act of 1985: Hearing before a subcommittee of the Committee on Government Operations, House of Representatives, Ninety-ninth Congress, first session, on H.R. 2889 ... September 18, 1985. Washington: U.S. G.P.O., 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

COBIT 5 for information security. Rolling Meadows, IL: ISACA, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Service standards at the Postal Service: Are customers getting what they paid for? : hearing before the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Tenth Congress, first session, August 2, 2007. Washington: U.S. G.P.O., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

United States. Government Accountability Office. Homeland Security: Guidance and standards are needed for measuring the effectiveness of agencies' facility protection efforts : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C: U.S. Government Accountability Office, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

National Institute of Standards and Technology (U.S.). Secure hash standard. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

), National Institute of Standards and Technology (U S. Secure hash standard. Gaithersburg, MD: Information Technology Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

National Institute of Standards and Technology (U.S.). Secure hash standard. Gaithersburg, MD: Information Technology Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

), National Institute of Standards and Technology (U S. Secure hash standard. Gaithersburg, MD: Information Technology Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

National Institute of Standards and Technology (U.S.). Secure hash standard. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography