Academic literature on the topic 'ISO 27001'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ISO 27001.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "ISO 27001"
Topa, Ioanna, and Maria Karyda. "From theory to practice: guidelines for enhancing information security management." Information & Computer Security 27, no. 3 (2019): 326–42. http://dx.doi.org/10.1108/ics-09-2018-0108.
Full textDisterer, Georg. "ISO/IEC 27000, 27001 and 27002 for Information Security Management." Journal of Information Security 04, no. 02 (2013): 92–100. http://dx.doi.org/10.4236/jis.2013.42011.
Full textDiamantopoulou, Vasiliki, Aggeliki Tsohou, and Maria Karyda. "From ISO/IEC27001:2013 and ISO/IEC27002:2013 to GDPR compliance controls." Information & Computer Security 28, no. 4 (2020): 645–62. http://dx.doi.org/10.1108/ics-01-2020-0004.
Full textCrespo-Martínez, Esteban, and Geovanna Cordero-Torres. "ESTUDIO COMPARATIVO ENTRE LAS METODOLOGÍAS CRAMM Y MAGERIT PARA LA GESTIÓN DE RIESGO DE TI EN LAS MPYMES." UDA AKADEM, no. 1 (June 13, 2018): 38–47. http://dx.doi.org/10.33324/udaakadem.vi1.129.
Full textال فيحان, اثير عبد الهادي, та عامر حمدي عبد غريب. "تقييم نظام أدارة امن المعلومات في الهيئة العراقية للحاسبات والمعلوماتية على وفق المواصفة الدولية (ISO/IEC 27001:2013". Journal of Economics and Administrative Sciences 21, № 86 (2015): 1. http://dx.doi.org/10.33095/jeas.v21i86.764.
Full textEverett, Cath. "Is ISO 27001 worth it?" Computer Fraud & Security 2011, no. 1 (2011): 5–7. http://dx.doi.org/10.1016/s1361-3723(11)70005-7.
Full textMusyarofah, Sitta Rif’atul, and Rahadian Bisma. "Analisis kesenjangan sistem manajemen keamanan informasi (SMKI) sebagai persiapan sertifikasi ISO/IEC 27001:2013 pada institusi pemerintah." Teknologi 11, no. 1 (2021): 1–15. http://dx.doi.org/10.26594/teknologi.v11i1.2152.
Full textSetyawan, Ervin, and Farid Sukmana. "Penilaian Standar Mutu Pada Aplikasi Tiket Bioskop dengan ISO 27001 dan Fishbone Analisis." JTIM : Jurnal Teknologi Informasi dan Multimedia 2, no. 4 (2021): 214–22. http://dx.doi.org/10.35746/jtim.v2i4.110.
Full textSundari, Piski, and Wella Wella. "SNI ISO/IEC 27001 dan Indeks KAMI: Manajemen Risiko PUSDATIN (PUPR)." Ultima InfoSys : Jurnal Ilmu Sistem Informasi 12, no. 1 (2021): 35–42. http://dx.doi.org/10.31937/si.v12i1.1701.
Full textMantra, IGN. "Implementation: Information Security Management System (ISMS) ISO 27001:2005 at Perbanas University." ACMIT Proceedings 1, no. 1 (2014): 46–58. http://dx.doi.org/10.33555/acmit.v1i1.18.
Full textDissertations / Theses on the topic "ISO 27001"
Peroutka, Tomáš. "Integrace ISMS/ISO 27001/ISO 27002 do společnosti RWE." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-114299.
Full textDoubková, Veronika. "Bezpečnostní rizika podle standardu ISO 27001." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-412984.
Full textŠumbera, Adam. "Zavedení managementu bezpečnosti informací v podniku dle ISO 27001." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-224217.
Full textLjunggren, Viktor, and Emil Freid. "Effekterna av en ISO/IEC 27001-certifiering : Upplevda förändringar bland små svenska organisationer." Thesis, Tekniska Högskolan, Jönköping University, JTH, Datateknik och informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-49716.
Full textPalička, Jan. "Systémové řešení bezpečnosti informací v organizaci." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-316954.
Full textZrcek, Tomáš. "Zhodnocení připravenosti podniku na zavedení ISO 27001 pomocí GAP analýzy." Master's thesis, Vysoká škola ekonomická v Praze, 2016. http://www.nusl.cz/ntk/nusl-203907.
Full textCoetzer, Christo. "An investigation of ISO/IEC 27001 adoption in South Africa." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018669.
Full textSantos, Valdeci Otacilio dos. "Um modelo de sistema de gestão da segurança da informação baseado nas normas ABNT NBR ISO/IEC 27001:2006, 27002:2005 e 27005:2008." [s.n.], 2012. http://repositorio.unicamp.br/jspui/handle/REPOSIP/259797.
Full textVicen, Šimon. "Zavedení standardu ISO 27701 do firmy využitím Gap analýzy." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-417718.
Full textKryštof, Tomáš. "Návrh na zavedení nutných oblastí ISMS na základní škole." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241476.
Full textBooks on the topic "ISO 27001"
Brenner, Michael, Nils gentschen Felde, Wolfgang Hommel, Stefan Metzger, Helmut Reiser, and Thomas Schaaf. Praxisbuch ISO/IEC 27001. Carl Hanser Verlag GmbH & Co. KG, 2011. http://dx.doi.org/10.3139/9783446430563.
Full text1970-, Watkins Steve, ed. IT governance: A manager's guide to data security and ISO 27001/ISO 27002. 4th ed. Kogan Page Limited, 2008.
Find full textKersten, Heinrich, Jürgen Reuter, and Klaus-Werner Schröder. IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz. Edited by Heinrich Kersten and Klaus-Dieter Wolfenstetter. Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-658-01724-8.
Full textKersten, Heinrich, Gerhard Klett, Jürgen Reuter, and Klaus-Werner Schröder. IT-Sicherheitsmanagement nach der neuen ISO 27001. Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-27692-8.
Full textKersten, Heinrich, Jürgen Reuter, and Klaus-Werner Schröder. IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz. Vieweg+Teubner, 2011. http://dx.doi.org/10.1007/978-3-8348-8165-6.
Full textKersten, Heinrich, Gerhard Klett, Jürgen Reuter, and Klaus-Werner Schröder. IT-Sicherheitsmanagement nach der neuen ISO 27001. Springer Fachmedien Wiesbaden, 2016. http://dx.doi.org/10.1007/978-3-658-14694-8.
Full textJürgen, Reuter, and Schröder Klaus-Werner, eds. IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz: Der Weg zur Zertifizierung. 4th ed. Springer Vieweg, 2013.
Find full textKersten, Heinrich. IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz: Der Weg zur Zertifizierung. Vieweg, 2008.
Find full textOtter, Martine. Guide des certifications SI: Comparatif, analyse et tendances : ITIL, CobiT, ISO 27001, eSCM... 2nd ed. Dunod, 2009.
Find full textInformation security policy development for compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0. CRC Press, Taylor & Francis Group, 2013.
Find full textBook chapters on the topic "ISO 27001"
Calder, Alan. "ISO 27001 and ISO 17799." In Governance, Risk, and Compliance Handbook. John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118269213.ch12.
Full textKersten, Heinrich, Jürgen Reuter, and Klaus-Werner Schröder. "Das ISMS nach ISO 27001." In IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz. Vieweg+Teubner, 2011. http://dx.doi.org/10.1007/978-3-8348-8165-6_3.
Full textKersten, Heinrich, Jürgen Reuter, and Klaus-Werner Schröder. "Das ISMS nach ISO 27001." In IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz. Springer Fachmedien Wiesbaden, 2013. http://dx.doi.org/10.1007/978-3-658-01724-8_3.
Full textBrenner, Michael, Nils gentschen Felde, Wolfgang Hommel, Stefan Metzger, Helmut Reiser, and Thomas Schaaf. "Zertifizierungsmöglichkeiten nach ISO/IEC 27000." In Praxisbuch ISO/IEC 27001. Carl Hanser Verlag GmbH & Co. KG, 2019. http://dx.doi.org/10.3139/9783446462762.007.
Full textBrenner, Michael, Nils gentschen Felde, Wolfgang Hommel, Stefan Metzger, Helmut Reiser, and Thomas Schaaf. "Begriffsbildung nach ISO/IEC 27000." In Praxisbuch ISO/IEC 27001. Carl Hanser Verlag GmbH & Co. KG, 2019. http://dx.doi.org/10.3139/9783446462762.008.
Full textBrenner, Michael, Nils gentschen Felde, Wolfgang Hommel, Stefan Metzger, Helmut Reiser, and Thomas Schaaf. "Zertifizierungsmöglichkeiten nach ISO/IEC 27000." In Praxisbuch ISO/IEC 27001. Carl Hanser Verlag GmbH & Co. KG, 2017. http://dx.doi.org/10.3139/9783446452602.007.
Full textBrenner, Michael, Nils gentschen Felde, Wolfgang Hommel, Stefan Metzger, Helmut Reiser, and Thomas Schaaf. "Begriffsbildung nach ISO/IEC 27000." In Praxisbuch ISO/IEC 27001. Carl Hanser Verlag GmbH & Co. KG, 2017. http://dx.doi.org/10.3139/9783446452602.008.
Full textBrenner, Michael, Nils gentschen Felde, Wolfgang Hommel, Stefan Metzger, Helmut Reiser, and Thomas Schaaf. "ISO/IEC 27001 – Spezifikationen und Mindestanforderungen." In Praxisbuch ISO/IEC 27001. Carl Hanser Verlag GmbH & Co. KG, 2019. http://dx.doi.org/10.3139/9783446462762.004.
Full textBrenner, Michael, Nils gentschen Felde, Wolfgang Hommel, Stefan Metzger, Helmut Reiser, and Thomas Schaaf. "Abdruck der DIN ISO/IEC 27001." In Praxisbuch ISO/IEC 27001. Carl Hanser Verlag GmbH & Co. KG, 2019. http://dx.doi.org/10.3139/9783446462762.009.
Full textBrenner, Michael, Nils gentschen Felde, Wolfgang Hommel, Stefan Metzger, Helmut Reiser, and Thomas Schaaf. "ISO/IEC 27001 – Spezifikationen und Mindestanforderungen." In Praxisbuch ISO/IEC 27001. Carl Hanser Verlag GmbH & Co. KG, 2017. http://dx.doi.org/10.3139/9783446452602.004.
Full textConference papers on the topic "ISO 27001"
Monev, Veselin. "Organisational Information Security Maturity Assessment Based on ISO 27001 and ISO 27002." In 2020 International Conference on Information Technologies (InfoTech). IEEE, 2020. http://dx.doi.org/10.1109/infotech49733.2020.9211066.
Full textShrivastava, Ankur Kumar, Abhinav Kumar, Anant Kumar Rai, Nitisha Payal, and Amod Tiwari. "ISO 27001 Compliance via Artificial Neural Network." In 2013 5th International Conference on Computational Intelligence and Communication Networks (CICN). IEEE, 2013. http://dx.doi.org/10.1109/cicn.2013.77.
Full textTalib, Manar Abu, Adel Khelifi, and Tahsin Ugurlu. "Using ISO 27001 in teaching information security." In IECON 2012 - 38th Annual Conference of IEEE Industrial Electronics. IEEE, 2012. http://dx.doi.org/10.1109/iecon.2012.6389395.
Full textCarvalho, Carla, and Eduardo Marques. "Adapting ISO 27001 to a Public Institution." In 2019 14th Iberian Conference on Information Systems and Technologies (CISTI). IEEE, 2019. http://dx.doi.org/10.23919/cisti.2019.8760870.
Full textMattes, Icaro Valente, and Sérgio Murilo Petri. "ACCOUNTING INFORMATION SECURITY: PROCEDURES FOR THE PREPARATION OF A SECURITY POLICY BASED ON ISO 27001 And ISO 27002." In 10th CONTECSI International Conference on Information Systems and Technology Management. TECSI, 2013. http://dx.doi.org/10.5748/9788599693094-10contecsi/ps-205.
Full textEvans, Rhys, Aggeliki Tsohou, Theo Tryfonas, and Thea Morgan. "Engineering secure systems with ISO 26702 and 27001." In 2010 5th International Conference on System of Systems Engineering (SoSE). IEEE, 2010. http://dx.doi.org/10.1109/sysose.2010.5544065.
Full textLopes, Isabel Maria, Teresa Guarda, and Pedro Oliveira. "How ISO 27001 Can Help Achieve GDPR Compliance." In 2019 14th Iberian Conference on Information Systems and Technologies (CISTI). IEEE, 2019. http://dx.doi.org/10.23919/cisti.2019.8760937.
Full textHsu, Carol, Tawei Wang, and Ang Lu. "The Impact of ISO 27001 Certification on Firm Performance." In 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE, 2016. http://dx.doi.org/10.1109/hicss.2016.600.
Full textAlKilani, Hamzeh, and Abdallah Qusef. "OSINT Techniques Integration with Risk Assessment ISO/IEC 27001." In DATA'21: International Conference on Data Science, E-learning and Information Systems 2021. ACM, 2021. http://dx.doi.org/10.1145/3460620.3460736.
Full textPecina, Koldo, Ricardo Estremera, Alfonso Bilbao, and Enrique Bilbao. "Physical and Logical Security management organization model based on ISO 31000 and ISO 27001." In 2011 International Carnahan Conference on Security Technology (ICCST). IEEE, 2011. http://dx.doi.org/10.1109/ccst.2011.6095894.
Full text