Books on the topic 'Information security standards'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Information security standards.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Security: Technical security standards for information technology. Ontario, Canada: Royal Canadian Mounted Police, 1992.
Find full textAalders, J. C. H. Handbook for information security: A guide towards information security standards. Amsterdam: North-Holland, 1985.
Find full textLandoll, Douglas J. Information Security Policies, Procedures, and Standards. Boca Raton, FL : CRC Press, 2016.: Auerbach Publications, 2017. http://dx.doi.org/10.1201/9781315372785.
Full textInformation Security Policies, Procedures, and Standards. London: Taylor and Francis, 2001.
Find full textTorp, Jeffrey. Information security: Guidance, standards, and issuances. Austin, Tex: AlexInformation, 2006.
Find full textInformation security policies, procedures, and standards: Guidelines for effective information security management. Boca Raton, FL: Auerbach, 2002.
Find full textInformation Technology Laboratory (National Institute of Standards and Technology). Standards for security categorization of federal information and information systems. Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2004.
Find full textSychev, Yuriy. Information protection and information security. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1013711.
Full textStandard security label for information transfer. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Computer Systems Laboratory, 1994.
Find full textLongley, Dennis. Information security: Dictionary of concepts, standards and terms. Houndmills, Basingstoke: Macmillan, 1992.
Find full textInformation security policies, procedures, and standards: A practitioner's reference. Boca Raton, FL: CRC Press, 2016.
Find full textInformation Technology Laboratory (National Institute of Standards and Technology). Minimum security requirements for federal information and information systems. Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2006.
Find full text), National Institute of Standards and Technology (U S. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textComputer Systems Laboratory (U.S.), ed. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Find full textWatkins, Steve. An introduction to information security and ISO27001: A pocket guide. Cambridgeshire, UK: IT Governance Pub., 2008.
Find full textStoneburner, Gary. CSPP: Guidance for COTS security protection profiles (formerly: CS2-- protection profile guidance for near-term COTS). Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textManaging HIPAA compliance: Standards for electronic transmission, privacy, and security of health information. Chicago, Ill: Health Administration Press, 2001.
Find full textApplication security in the ISO27001 environment. Ely, U.K: IT Governance Pub., 2008.
Find full textname, No. Security standards for healthcare information systems: A perspective from the EU ISSI MEDSEC project. Amsterdam: IOS Press, 2000.
Find full textStoneburner, Gary. Engineering principles for information technology security (a baseline for achieving security): Recommendations of the National Institute of Standards and Technology. Gaithersburg, Md: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2001.
Find full textStandardization, International Organization for. Information processing systems: Open systems interconnection, basic reference model. [Geneva, Switzerland?]: The Organzation, 1988.
Find full textStandardization, International Organization for. Information processing systems: Open systems interconnection, basic reference model. [Geneva, Switzerland?]: The Organization, 1989.
Find full textStandardization, International Organization for. Information processing systems: Open systems interconnection, basic reference model. [Geneva, Switzerland?]: The Organization, 1989.
Find full textDeluccia, James J. IT compliance and controls: Best practices for implementation. Hoboken, N.J: John Wiley & Sons, 2008.
Find full textUnited States. Congress. House. Committee on Government Reform. Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census. Exploring common criteria: Can it assure that the federal government gets needed security in software? : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, September 17, 2003. Washington: U.S. G.P.O., 2004.
Find full textPolice, Royal Canadian Mounted. Technical security standards for information technology (TSSIT) =: Normes de sécurité technique dans le domaine de la technologie de l'information. Ottawa, Ont: Royal Canadian Mounted Police = Gendarmerie royale du Canada, 1992.
Find full textSecurity without obscurity: A guide to confidentiality, authentication, and integrity. Boca Raton, FL: CRC Press, Taylor & Francis Group, 2014.
Find full textChuvakin, Anton. PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance. 2nd ed. Burlington: Elsevier, 2009.
Find full textHowland, Charles B. Balancing facility security against the broad public dissemination of facility-specific environmental information post 9/11. [Chicago?]: American Bar Association, Section on Environment, Energy, and Resources, 2002.
Find full textPolischuk, Yuriy, and Aleksandr Borovskiy. Databases and their security. ru: INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1011088.
Full textUnited States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations. H.R. 3844, the Federal Information Security Management Act of 2002: Hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, second session on H.R. 3844 to strengthen federal government information security, including through the requirement for the development of mandatory information security risk management standards, May 2, 2002. Washington: U.S. G.P.O., 2003.
Find full textBlinovskaya, Yana, and Dar'ya Zadoya. Geoinformation systems in technosphere security. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1002663.
Full textUnited States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, and International Security. An assessment of federal funding for private research and development: Hearing before the Federal Financial Management, Government Information, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Ninth Congress, first session, May 26, 2005. Washington: U.S. G.P.O., 2006.
Find full textBrock, Jack L. Impact of the governmentwide computer security planning and review process: Statement of Jack L. Brock, Jr., Director, Government Information and Financial Management Issues, Information Management and Technology Division, before the Subcommittee on Transportation, Aviation and Materials, Committee on Science, Space, and Technology, House of Representatives. [Washington, D.C.]: The Office, 1990.
Find full textCloud computing: An overview of the technology and the issues facing American innovators : hearing before the Subcommittee on Intellectual Property, Competition, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Twelfth Congress, second session, July 25, 2012. Washington: U.S. G.P.O., 2012.
Find full textBakolia, George. Assessment of agency compliance with enterprise security standards: As directed by session law 2003-153, section 1(a), general statute 147-33.82(el), 2003 session of the North Carolina General Assembly. United States]: Gartner, Inc., 2004.
Find full textPolice, Royal Canadian Mounted. Technical security standard for information technology. Ottawa: Treasury Board, 1995.
Find full textCybersecurity activities at NIST's Information Technology Laboratory: Hearing before the Subcommittee on Technology and Innovation, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, first session, October 22, 2009. Washington: U.S. G.P.O., 2010.
Find full textUnited States. Government Accountability Office. Financial management: Challenges in meeting requirements of the improper payments information act : report to the Chairman, Subcommittee on Government Management, Finance, and Accountability, Committee on Government Reform, House of Representatives. Washington, D.C: GAO, 2005.
Find full textRusskevich, Evgeniy. Criminally-legal counteraction to crimes committed through the use of modern information and communication technologies. ru: INFRA-M Academic Publishing LLC., 2017. http://dx.doi.org/10.12737/24712.
Full textSubcommittee, United States Congress House Committee on Government Operaions Legislation and National Security. Computer Security Research and Training Act of 1985: Hearing before a subcommittee of the Committee on Government Operations, House of Representatives, Ninety-ninth Congress, first session, on H.R. 2889 ... September 18, 1985. Washington: U.S. G.P.O., 1986.
Find full textService standards at the Postal Service: Are customers getting what they paid for? : hearing before the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Tenth Congress, first session, August 2, 2007. Washington: U.S. G.P.O., 2008.
Find full textUnited States. Government Accountability Office. Homeland Security: Guidance and standards are needed for measuring the effectiveness of agencies' facility protection efforts : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C: U.S. Government Accountability Office, 2006.
Find full textNational Institute of Standards and Technology (U.S.). Secure hash standard. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 1995.
Find full text), National Institute of Standards and Technology (U S. Secure hash standard. Gaithersburg, MD: Information Technology Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 2002.
Find full textNational Institute of Standards and Technology (U.S.). Secure hash standard. Gaithersburg, MD: Information Technology Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 2002.
Find full text), National Institute of Standards and Technology (U S. Secure hash standard. Gaithersburg, MD: Information Technology Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 2002.
Find full textNational Institute of Standards and Technology (U.S.). Secure hash standard. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 1995.
Find full text