Academic literature on the topic 'ISO/IEC 27000'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ISO/IEC 27000.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "ISO/IEC 27000"
Disterer, Georg. "ISO/IEC 27000, 27001 and 27002 for Information Security Management." Journal of Information Security 04, no. 02 (2013): 92–100. http://dx.doi.org/10.4236/jis.2013.42011.
Full textMarcos, Antonio Folgueras, José Carlos Alva Tello, Belén Ruiz-Mezcua, and Ángel García Crespo. "Detection of Strategies in IT Organizations through an Integrated IT Compliance Model." International Journal of IT/Business Alignment and Governance 1, no. 4 (2010): 40–57. http://dx.doi.org/10.4018/jitbag.2010100103.
Full textKozhedub, Yuliia. "Modern aspects of updating international standards of series ISO/IEC 27000." Collection "Information technology and security" 4, no. 1 (2016): 20–26. http://dx.doi.org/10.20535/2411-1031.2016.4.1.95921.
Full textVarsos, Dimitrios S., Stergiani A. Giannakou, and Nikitas A. Assimakopoulos. "A Systems Approach to Information Security for the Twenty-First Century Organization." Acta Europeana Systemica 8 (July 10, 2020): 167–78. http://dx.doi.org/10.14428/aes.v8i1.56343.
Full textWOLANIUK, Leszek. "SELECTED PROBLEMS OF SECURITY OF INFORMATION CONFIDENTIALITY IN CYBERSPACE." Journal of Science of the Gen. Tadeusz Kosciuszko Military Academy of Land Forces 186, no. 4 (2017): 194–207. http://dx.doi.org/10.5604/01.3001.0010.7228.
Full textDiamantopoulou, Vasiliki, Aggeliki Tsohou, and Maria Karyda. "From ISO/IEC27001:2013 and ISO/IEC27002:2013 to GDPR compliance controls." Information & Computer Security 28, no. 4 (2020): 645–62. http://dx.doi.org/10.1108/ics-01-2020-0004.
Full textال فيحان, اثير عبد الهادي, та عامر حمدي عبد غريب. "تقييم نظام أدارة امن المعلومات في الهيئة العراقية للحاسبات والمعلوماتية على وفق المواصفة الدولية (ISO/IEC 27001:2013". Journal of Economics and Administrative Sciences 21, № 86 (2015): 1. http://dx.doi.org/10.33095/jeas.v21i86.764.
Full textSugianto, Anindya Dwi Lestari, Febriliyan Samopa, and Hanim Maria Astuti. "PENILAIAN DAN KONTROL RISIKO TERHADAP INFRASTRUKTUR DAN KEAMANAN INFORMASI BERDASARKAN STANDAR ISO/IEC 27001:2013 (STUDI KASUS: INSTITUT TEKNOLOGI SEPULUH NOPEMBER)." Sebatik 24, no. 1 (2020): 96–101. http://dx.doi.org/10.46984/sebatik.v24i1.910.
Full textMauladani, Furqon, and Daniel Oranova Siahaan. "Perancangan SMKI Berdasarkan SNI ISO/IEC27001:2013 dan SNI ISO/IEC27005:2013 (Studi Kasus DPTSI-ITS)." CSRID (Computer Science Research and Its Development Journal) 10, no. 1 (2018): 32. http://dx.doi.org/10.22303/csrid.10.1.2018.32-43.
Full textHermawan, Wawan. "Perancangan Manajemen Risiko Keamanan Informasi pada Penyelenggara Sertifikasi Elektronik (PSrE)." Jurnal Telekomunikasi dan Komputer 9, no. 2 (2019): 129. http://dx.doi.org/10.22441/incomtech.v9i2.6474.
Full textDissertations / Theses on the topic "ISO/IEC 27000"
Alila, Patrick. "Complementing network security to the ISO/IEC 27000 standard." Thesis, Linköpings universitet, Institutionen för teknik och naturvetenskap, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-96298.
Full textPalička, Jan. "Systémové řešení bezpečnosti informací v organizaci." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-316954.
Full textValášková, Martina. "Návrh bezpečnostních opatření v souladu s ISMS pro zdravotnické zařízení." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-417805.
Full textKrídla, Matúš. "Návrh zavedení bezpečnostních opatření pro danou společnost." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444607.
Full textTomko, Michal. "Návrh zavedení bezpečnostních opatření na základě ISMS pro malý podnik." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-402087.
Full textNemec, Tomáš. "Návrh metodiky pro příručku ISMS a opatření aplikované na vybrané oblasti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-224225.
Full textPalarczyk, Vít. "Zavedení ISMS v malém podniku." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2015. http://www.nusl.cz/ntk/nusl-224894.
Full textSvoboda, Milan. "Zavedení ISMS v malém podniku." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241114.
Full textŠebrle, Petr. "Zavedení ISMS do podniku podporujícího kritickou infrastrukturu." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318630.
Full textKutiš, Pavel. "Management bezpečnosti informačních systémů v obci." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-224220.
Full textBooks on the topic "ISO/IEC 27000"
Brenner, Michael, Nils gentschen Felde, Wolfgang Hommel, Stefan Metzger, Helmut Reiser, and Thomas Schaaf. Praxisbuch ISO/IEC 27001. Carl Hanser Verlag GmbH & Co. KG, 2011. http://dx.doi.org/10.3139/9783446430563.
Full textKersten, Heinrich. IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz: Der Weg zur Zertifizierung. Vieweg, 2008.
Find full textInformation security policy development for compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0. CRC Press, Taylor & Francis Group, 2013.
Find full textImplementing the ISO/IEC 27001 Information Security Management System Standard. Artech House Publishers, 2007.
Find full textHumphreys, Ted, and Angelika Plate. Measuring the Effectiveness of Your ISMS Implementations Based on ISO/IEC 27001. BSI Standards, 2006.
Find full textBook chapters on the topic "ISO/IEC 27000"
Brenner, Michael, Nils gentschen Felde, Wolfgang Hommel, Stefan Metzger, Helmut Reiser, and Thomas Schaaf. "Zertifizierungsmöglichkeiten nach ISO/IEC 27000." In Praxisbuch ISO/IEC 27001. Carl Hanser Verlag GmbH & Co. KG, 2019. http://dx.doi.org/10.3139/9783446462762.007.
Full textBrenner, Michael, Nils gentschen Felde, Wolfgang Hommel, Stefan Metzger, Helmut Reiser, and Thomas Schaaf. "Begriffsbildung nach ISO/IEC 27000." In Praxisbuch ISO/IEC 27001. Carl Hanser Verlag GmbH & Co. KG, 2019. http://dx.doi.org/10.3139/9783446462762.008.
Full textBrenner, Michael, Nils gentschen Felde, Wolfgang Hommel, Stefan Metzger, Helmut Reiser, and Thomas Schaaf. "Zertifizierungsmöglichkeiten nach ISO/IEC 27000." In Praxisbuch ISO/IEC 27001. Carl Hanser Verlag GmbH & Co. KG, 2017. http://dx.doi.org/10.3139/9783446452602.007.
Full textBrenner, Michael, Nils gentschen Felde, Wolfgang Hommel, Stefan Metzger, Helmut Reiser, and Thomas Schaaf. "Begriffsbildung nach ISO/IEC 27000." In Praxisbuch ISO/IEC 27001. Carl Hanser Verlag GmbH & Co. KG, 2017. http://dx.doi.org/10.3139/9783446452602.008.
Full textBrenner, Michael, Nils gentschen Felde, Wolfgang Hommel, Stefan Metzger, Helmut Reiser, and Thomas Schaaf. "Die Standardfamilie ISO/IEC 27000 im Überblick." In Praxisbuch ISO/IEC 27001. Carl Hanser Verlag GmbH & Co. KG, 2019. http://dx.doi.org/10.3139/9783446462762.002.
Full textBrenner, Michael, Nils gentschen Felde, Wolfgang Hommel, Stefan Metzger, Helmut Reiser, and Thomas Schaaf. "Die Standardfamilie ISO/IEC 27000 im Überblick." In Praxisbuch ISO/IEC 27001. Carl Hanser Verlag GmbH & Co. KG, 2017. http://dx.doi.org/10.3139/9783446452602.002.
Full textLepofsky, Ron. "ISO/IEC 17799:2005 and the ISO/IEC 27000:2014 Series." In The Manager’s Guide to Web Application Security:. Apress, 2014. http://dx.doi.org/10.1007/978-1-4842-0148-0_12.
Full textSuhaimi, Ahmad Iqbal Hakim, Yuichi Goto, and Jingde Cheng. "An Engineering Environment Based on ISO/IEC 27000 Series Standards for Supporting Organizations with ISMSs." In Lecture Notes in Electrical Engineering. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-55038-6_30.
Full textKlipper, Sebastian. "ISO/IEC 27005." In Information Security Risk Management. Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-658-08774-6_3.
Full textKlipper, Sebastian. "ISO/IEC 27005." In Information Security Risk Management. Vieweg+Teubner, 2011. http://dx.doi.org/10.1007/978-3-8348-9870-8_3.
Full textConference papers on the topic "ISO/IEC 27000"
"ISO/IEC 15504 BEST PRACTICES TO FACILITATE ISO/IEC 27000 IMPLEMENTATION." In International Conference on Evaluation of Novel Approaches to Software Engineering. SciTePress - Science and and Technology Publications, 2010. http://dx.doi.org/10.5220/0003001001920198.
Full textWatson, Venesa, Edita Bajramovic, Xinxin Lou, and Karl Waedt. "Example of Graded and Lifecycle Phase-Specific Security Controls for Nuclear I&C and EPS Use Cases." In 2018 26th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/icone26-81601.
Full textTjirare, Diana Jogbeth, and Fungai Bhunu Shava. "A gap analysis of the ISO/IEC 27000 standard implementation in Namibia." In 2017 IST-Africa Week Conference (IST-Africa). IEEE, 2017. http://dx.doi.org/10.23919/istafrica.2017.8102376.
Full textRianafirin, Kartika, and Mochamad Teguh Kurniawan. "Design network security infrastructure cabling using network development life cycle methodology and ISO/IEC 27000 series in Yayasan Kesehatan (Yakes) Telkom Bandung." In 2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT). IEEE, 2017. http://dx.doi.org/10.1109/caipt.2017.8320681.
Full textLeitner, Alexander, and Ingrid Schaumuller-Bichl. "ARiMA - A New Approach to Implement ISO/IEC 27005." In 2009 2nd International Symposium on Logistics and Industrial Informatics (LINDI 2009). IEEE, 2009. http://dx.doi.org/10.1109/lindi.2009.5258624.
Full textAlKilani, Hamzeh, and Abdallah Qusef. "OSINT Techniques Integration with Risk Assessment ISO/IEC 27001." In DATA'21: International Conference on Data Science, E-learning and Information Systems 2021. ACM, 2021. http://dx.doi.org/10.1145/3460620.3460736.
Full textBejtullahu, Driton S., Edmond Hajrizi, and Naim Preniqi. "Benefits of Implementation of the Systems Management Systems Standards in Kosovo (ISO 9001, ISO / IEC 27001 and ISO / IEC 20000)." In University for Business and Technology International Conference. University for Business and Technology, 2018. http://dx.doi.org/10.33107/ubt-ic.2018.199.
Full textSussy, Bayona, Chauca Wilber, Lopez Milagros, and Maldonado Carlos. "ISO/IEC 27001 implementation in public organizations: A case study." In 2015 10th Iberian Conference on Information Systems and Technologies (CISTI). IEEE, 2015. http://dx.doi.org/10.1109/cisti.2015.7170355.
Full textIqbal, Ahmad, Daisuke Horie, Yuichi Goto, and Jingde Cheng. "A Database System for Effective Utilization of ISO/IEC 27002." In 2009 Fourth International Conference on Frontier of Computer Science and Technology (FCST). IEEE, 2009. http://dx.doi.org/10.1109/fcst.2009.88.
Full text"A GAP ANALYSIS TOOL FOR SMES TARGETING ISO/IEC 27001 COMPLIANCE." In 12th International Conference on Enterprise Information Systems. SciTePress - Science and and Technology Publications, 2010. http://dx.doi.org/10.5220/0002865504130416.
Full text