Letteratura scientifica selezionata sul tema "Information security standards"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Information security standards".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Information security standards"
Pepper, Bill. "Information security standards for outsourcing". Information Security Technical Report 1, n. 3 (gennaio 1996): 59–61. http://dx.doi.org/10.1016/s1363-4127(97)83021-x.
Testo completoHumphreys, Edward. "Information security management system standards". Datenschutz und Datensicherheit - DuD 35, n. 1 (gennaio 2011): 7–11. http://dx.doi.org/10.1007/s11623-011-0004-3.
Testo completoHöne, Karin, e J. H. P. Eloff. "Information security policy — what do international information security standards say?" Computers & Security 21, n. 5 (ottobre 2002): 402–9. http://dx.doi.org/10.1016/s0167-4048(02)00504-7.
Testo completoGaivéo, José. "Information Security Standards in Healthcare Activities". International Journal of Reliable and Quality E-Healthcare 5, n. 4 (ottobre 2016): 15–33. http://dx.doi.org/10.4018/ijrqeh.2016100102.
Testo completoDykyi, O., e M. Fliunt. "Information security standards: a comparative research". Law and public administration 2, n. 1 (2019): 88–95. http://dx.doi.org/10.32840/pdu.2-1.14.
Testo completoLee, Chul Ho, Xianjun Geng e Srinivasan Raghunathan. "Mandatory Standards and Organizational Information Security". Information Systems Research 27, n. 1 (marzo 2016): 70–86. http://dx.doi.org/10.1287/isre.2015.0607.
Testo completoPoore, Ralph Spencer. "Information Security Standards: Deluge and Dearth". Information Systems Security 10, n. 1 (marzo 2001): 1–6. http://dx.doi.org/10.1201/1086/43313.10.1.20010304/31392.4.
Testo completoGentile, Francesco, Luigi Giuri, Franco Guida, Emilio Montolivo e Michele Volpe. "Security evaluation in information technology standards". Computers & Security 13, n. 8 (gennaio 1994): 647–50. http://dx.doi.org/10.1016/0167-4048(94)90044-2.
Testo completoChenoweth, John D. "Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management". Journal of Information Privacy and Security 1, n. 1 (gennaio 2005): 43–44. http://dx.doi.org/10.1080/15536548.2005.10855762.
Testo completovon Solms, Rossouw. "Information security management: why standards are important". Information Management & Computer Security 7, n. 1 (marzo 1999): 50–58. http://dx.doi.org/10.1108/09685229910255223.
Testo completoTesi sul tema "Information security standards"
Thomson, Steven Michael. "A standards-based security model for health information systems". Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/718.
Testo completoJohan, Boström. "Compliance & Standards - The Journey To Security". Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-446601.
Testo completoShoraka, Babak. "An Empirical Investigation of the Economic Value of Information Security Management System Standards". NSUWorks, 2011. http://nsuworks.nova.edu/gscis_etd/304.
Testo completoNgqondi, Tembisa Grace. "The ISO/IEC 27002 and ISO/IEC 27799 information security management standards : a comparative analysis from a healthcare perspective". Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/1066.
Testo completoDomingues, Steve. "Navigating between information security management documents : a modeling methodology". Thesis, Nelson Mandela Metropolitan University, 2010. http://hdl.handle.net/10948/1212.
Testo completoDresner, Daniel Gideon. "A study of standards and the mitigation of risk in information systems". Thesis, University of Manchester, 2011. https://www.research.manchester.ac.uk/portal/en/theses/a-study-of-standards-and-the-mitigation-of-risk-in-information-systems(d316550b-f305-4802-a037-688bb44bdc48).html.
Testo completoALEXANDRIA, JOAO C. S. de. "Gestao da seguranca da informacao - uma proposta para potencializar a efetividade da seguranca da informacao em ambiente de pesquisa cientifica". reponame:Repositório Institucional do IPEN, 2009. http://repositorio.ipen.br:8080/xmlui/handle/123456789/9474.
Testo completoMade available in DSpace on 2014-10-09T13:56:07Z (GMT). No. of bitstreams: 0
Tese (Doutoramento)
IPEN/T
Instituto de Pesquisas Energeticas e Nucleares - IPEN-CNEN/SP
Owen, Morné. "An enterprise information security model for a micro finance company: a case study". Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/1151.
Testo completoHedian, Daniel, e Neto Gil Silva. "The Risk Assessment based on international standards, a credibility evaluation: A case study on international standards of Risk Assessment and Management in the Information Security context". Thesis, Umeå universitet, Företagsekonomi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-99982.
Testo completoMikkelinen, Nicklas. "Analysis of information classification best practices". Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-11551.
Testo completoLibri sul tema "Information security standards"
Security: Technical security standards for information technology. Ontario, Canada: Royal Canadian Mounted Police, 1992.
Cerca il testo completoAalders, J. C. H. Handbook for information security: A guide towards information security standards. Amsterdam: North-Holland, 1985.
Cerca il testo completoLandoll, Douglas J. Information Security Policies, Procedures, and Standards. Boca Raton, FL : CRC Press, 2016.: Auerbach Publications, 2017. http://dx.doi.org/10.1201/9781315372785.
Testo completoInformation Security Policies, Procedures, and Standards. London: Taylor and Francis, 2001.
Cerca il testo completoTorp, Jeffrey. Information security: Guidance, standards, and issuances. Austin, Tex: AlexInformation, 2006.
Cerca il testo completoInformation security policies, procedures, and standards: Guidelines for effective information security management. Boca Raton, FL: Auerbach, 2002.
Cerca il testo completoKou, Weidong. Networking Security and Standards. Boston, MA: Springer US, 1997.
Cerca il testo completoInformation Technology Laboratory (National Institute of Standards and Technology). Standards for security categorization of federal information and information systems. Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2004.
Cerca il testo completoSychev, Yuriy. Information protection and information security. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1013711.
Testo completoStandard security label for information transfer. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Computer Systems Laboratory, 1994.
Cerca il testo completoCapitoli di libri sul tema "Information security standards"
Pawaskar, Samir. "Information Security Policy and Standards". In Information Security and Optimization, 1–12. First edition. | Boca Raton : C&H\CRC Press, 2021.: Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781003045854-1.
Testo completoCampbell, Tony. "Standards, Frameworks, Guidelines, and Legislation". In Practical Information Security Management, 71–93. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1685-9_6.
Testo completoBrooks, W. J., M. Warren e W. Hutchinson. "A Security Evaluation Criteria for Baseline Security Standards". In IFIP Advances in Information and Communication Technology, 79–89. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35586-3_6.
Testo completoShoniregun, Charles A., Kudakwashe Dube e Fredrick Mtenzi. "Laws and Standards for Secure e-Healthcare Information". In Advances in Information Security, 59–100. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-0-387-84919-5_3.
Testo completovon Solms, S. H., e R. von Solms. "The Use of Best Practice Standards and Guidelines in Information Security Governance". In Information Security Governance, 1–21. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79984-1_5.
Testo completoHakim Suhaimi, Ahmad Iqbal, Takashi Manji, Yuichi Goto e Jingde Cheng. "A Systematic Management Method of ISO Information Security Standards for Information Security Engineering Environments". In Informatics Engineering and Information Science, 370–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25327-0_32.
Testo completoSnare, John. "Information technology security standards — An Australian perspective". In Advances in Cryptology — AUSCRYPT '92, 365–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/3-540-57220-1_76.
Testo completoGuarino, Alessandro. "Information Security Standards in Critical Infrastructure Protection". In ISSE 2015, 263–69. Wiesbaden: Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-658-10934-9_22.
Testo completoBello, Gabriel, e Alfredo J. Perez. "On the Application of Financial Security Standards in Blockchain Platforms". In Advances in Information Security, 247–67. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38181-3_13.
Testo completoModeste, Ken. "Current Standards for Cyber-Hygiene in Industrial Control System Environments". In Advances in Information Security, 3–15. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-18214-4_1.
Testo completoAtti di convegni sul tema "Information security standards"
Kajava, Jorma, Juhani Anttila, Rauno Varonen, Reijo Savola e Juha Roning. "Information Security Standards and Global Business". In 2006 IEEE International Conference on Industrial Technology. IEEE, 2006. http://dx.doi.org/10.1109/icit.2006.372505.
Testo completoGapinski, Andrzej J. "Cloud Computing: Information Security Standards, Compliance and Attestation". In The Thirteenth Latin American and Caribbean Conference for Engineering and Technology. LACCEI, 2015. http://dx.doi.org/10.18687/laccei2015.1.1.065.
Testo completoWang, YuFei, Bo Zhang, WeiMin Lin e Tao Zhang. "Smart grid information security - a research on standards". In 2011 IEEE International Conference on Advanced Power System Automation and Protection (APAP). IEEE, 2011. http://dx.doi.org/10.1109/apap.2011.6180558.
Testo completoArmstrong, Colin J., e Helen L. Armstrong. "Mapping information security curricula to professional accreditation standards". In 2007 IEEE SMC Information Assurance and Security Workshop. IEEE, 2007. http://dx.doi.org/10.1109/iaw.2007.381910.
Testo completoRuamjinda, Poramaporn, e Nakornthip Prompoon. "Framwork for information security standards storage and retrieval using security patterns". In 2013 IEEE 4th International Conference on Software Engineering and Service Science (ICSESS). IEEE, 2013. http://dx.doi.org/10.1109/icsess.2013.6615309.
Testo completo"Understanding Information Technology Security Standards Diffusion - An Institutional Perspective". In 1st International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and and Technology Publications, 2015. http://dx.doi.org/10.5220/0005227200050016.
Testo completoChee, Joseph, e Ming Teo. "Improving Security in the IEEE 802.16 Standards". In 2011 Eighth International Conference on Information Technology: New Generations (ITNG). IEEE, 2011. http://dx.doi.org/10.1109/itng.2011.79.
Testo completoLontsikh, Pavel A., Viktoria A. Karaseva, Egor P. Kunakov, Ilia I. Livshitz e Ksenia A. Nikiforova. "Implementation of information security and data processing center protection standards". In 2016 IEEE Conference on Quality Management, Transport and Information Security, Information Technologies (IT&MQ&IS). IEEE, 2016. http://dx.doi.org/10.1109/itmqis.2016.7751923.
Testo completoSipior, Janice, e Burke Ward. "A Framework for Information Security Management Based on Guiding Standards: A United States Perspective". In InSITE 2008: Informing Science + IT Education Conference. Informing Science Institute, 2008. http://dx.doi.org/10.28945/3188.
Testo completoOlifer, Dmitrij. "Evaluation metrics for ontology-based security standards mapping". In 2015 Open Conference of Electrical, Electronic and Information Sciences (eStream). IEEE, 2015. http://dx.doi.org/10.1109/estream.2015.7119494.
Testo completoRapporti di organizzazioni sul tema "Information security standards"
Mouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, luglio 2021. http://dx.doi.org/10.6028/nist.ir.8319.
Testo completoGarcía-Espinosa, J., e C. Soriano. Data management plan. Scipedia, 2021. http://dx.doi.org/10.23967/prodphd.2021.9.003.
Testo completoKramer, Robert. LED Street Lighting Implementation Research, Support, and Testing. Purdue University, 2020. http://dx.doi.org/10.5703/1288284317274.
Testo completoFederal Information Processing Standards Publication: standard security label for information transfer. Gaithersburg, MD: National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.fips.188.
Testo completoStandards for security categorization of federal information and information systems. Gaithersburg, MD: National Institute of Standards and Technology, febbraio 2004. http://dx.doi.org/10.6028/nist.fips.199.
Testo completoFederal Information Processing Standards Publication: security requirements for cryptographic modules. Gaithersburg, MD: National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.fips.140-1.
Testo completoFederal Information Processing Standards Publication: guideline for the analysis of local area network security. Gaithersburg, MD: National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.fips.191.
Testo completoFederal Information Processing Standards Publication: interoperability and security requirements for use of the data encryption standard with CCITT group 3 facsimile equipment. Gaithersburg, MD: National Bureau of Standards, 1985. http://dx.doi.org/10.6028/nbs.fips.141.
Testo completo