Libri sul tema "Information security standards"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 libri per l'attività di ricerca sul tema "Information security standards".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.
Security: Technical security standards for information technology. Ontario, Canada: Royal Canadian Mounted Police, 1992.
Cerca il testo completoAalders, J. C. H. Handbook for information security: A guide towards information security standards. Amsterdam: North-Holland, 1985.
Cerca il testo completoLandoll, Douglas J. Information Security Policies, Procedures, and Standards. Boca Raton, FL : CRC Press, 2016.: Auerbach Publications, 2017. http://dx.doi.org/10.1201/9781315372785.
Testo completoInformation Security Policies, Procedures, and Standards. London: Taylor and Francis, 2001.
Cerca il testo completoTorp, Jeffrey. Information security: Guidance, standards, and issuances. Austin, Tex: AlexInformation, 2006.
Cerca il testo completoInformation security policies, procedures, and standards: Guidelines for effective information security management. Boca Raton, FL: Auerbach, 2002.
Cerca il testo completoKou, Weidong. Networking Security and Standards. Boston, MA: Springer US, 1997.
Cerca il testo completoInformation Technology Laboratory (National Institute of Standards and Technology). Standards for security categorization of federal information and information systems. Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2004.
Cerca il testo completoSychev, Yuriy. Information protection and information security. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1013711.
Testo completoStandard security label for information transfer. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Computer Systems Laboratory, 1994.
Cerca il testo completoLongley, Dennis. Information security: Dictionary of concepts, standards and terms. Houndmills, Basingstoke: Macmillan, 1992.
Cerca il testo completoInformation security policies, procedures, and standards: A practitioner's reference. Boca Raton, FL: CRC Press, 2016.
Cerca il testo completoInformation Technology Laboratory (National Institute of Standards and Technology). Minimum security requirements for federal information and information systems. Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2006.
Cerca il testo completo), National Institute of Standards and Technology (U S. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Cerca il testo completoComputer Systems Laboratory (U.S.), a cura di. Security requirements for cryptographic modules. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, 1994.
Cerca il testo completoWatkins, Steve. An introduction to information security and ISO27001: A pocket guide. Cambridgeshire, UK: IT Governance Pub., 2008.
Cerca il testo completoStoneburner, Gary. CSPP: Guidance for COTS security protection profiles (formerly: CS2-- protection profile guidance for near-term COTS). Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Cerca il testo completoManaging HIPAA compliance: Standards for electronic transmission, privacy, and security of health information. Chicago, Ill: Health Administration Press, 2001.
Cerca il testo completoApplication security in the ISO27001 environment. Ely, U.K: IT Governance Pub., 2008.
Cerca il testo completoname, No. Security standards for healthcare information systems: A perspective from the EU ISSI MEDSEC project. Amsterdam: IOS Press, 2000.
Cerca il testo completoStoneburner, Gary. Engineering principles for information technology security (a baseline for achieving security): Recommendations of the National Institute of Standards and Technology. Gaithersburg, Md: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2001.
Cerca il testo completoStandardization, International Organization for. Information processing systems: Open systems interconnection, basic reference model. [Geneva, Switzerland?]: The Organzation, 1988.
Cerca il testo completoStandardization, International Organization for. Information processing systems: Open systems interconnection, basic reference model. [Geneva, Switzerland?]: The Organization, 1989.
Cerca il testo completoStandardization, International Organization for. Information processing systems: Open systems interconnection, basic reference model. [Geneva, Switzerland?]: The Organization, 1989.
Cerca il testo completoDeluccia, James J. IT compliance and controls: Best practices for implementation. Hoboken, N.J: John Wiley & Sons, 2008.
Cerca il testo completoUnited States. Congress. House. Committee on Government Reform. Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census. Exploring common criteria: Can it assure that the federal government gets needed security in software? : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, September 17, 2003. Washington: U.S. G.P.O., 2004.
Cerca il testo completoPolice, Royal Canadian Mounted. Technical security standards for information technology (TSSIT) =: Normes de sécurité technique dans le domaine de la technologie de l'information. Ottawa, Ont: Royal Canadian Mounted Police = Gendarmerie royale du Canada, 1992.
Cerca il testo completoSecurity without obscurity: A guide to confidentiality, authentication, and integrity. Boca Raton, FL: CRC Press, Taylor & Francis Group, 2014.
Cerca il testo completoChuvakin, Anton. PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance. 2a ed. Burlington: Elsevier, 2009.
Cerca il testo completoHowland, Charles B. Balancing facility security against the broad public dissemination of facility-specific environmental information post 9/11. [Chicago?]: American Bar Association, Section on Environment, Energy, and Resources, 2002.
Cerca il testo completoPolischuk, Yuriy, e Aleksandr Borovskiy. Databases and their security. ru: INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1011088.
Testo completoUnited States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations. H.R. 3844, the Federal Information Security Management Act of 2002: Hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, second session on H.R. 3844 to strengthen federal government information security, including through the requirement for the development of mandatory information security risk management standards, May 2, 2002. Washington: U.S. G.P.O., 2003.
Cerca il testo completoBlinovskaya, Yana, e Dar'ya Zadoya. Geoinformation systems in technosphere security. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1002663.
Testo completoUnited States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, and International Security. An assessment of federal funding for private research and development: Hearing before the Federal Financial Management, Government Information, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Ninth Congress, first session, May 26, 2005. Washington: U.S. G.P.O., 2006.
Cerca il testo completoBrock, Jack L. Impact of the governmentwide computer security planning and review process: Statement of Jack L. Brock, Jr., Director, Government Information and Financial Management Issues, Information Management and Technology Division, before the Subcommittee on Transportation, Aviation and Materials, Committee on Science, Space, and Technology, House of Representatives. [Washington, D.C.]: The Office, 1990.
Cerca il testo completoCloud computing: An overview of the technology and the issues facing American innovators : hearing before the Subcommittee on Intellectual Property, Competition, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Twelfth Congress, second session, July 25, 2012. Washington: U.S. G.P.O., 2012.
Cerca il testo completoBakolia, George. Assessment of agency compliance with enterprise security standards: As directed by session law 2003-153, section 1(a), general statute 147-33.82(el), 2003 session of the North Carolina General Assembly. United States]: Gartner, Inc., 2004.
Cerca il testo completoPolice, Royal Canadian Mounted. Technical security standard for information technology. Ottawa: Treasury Board, 1995.
Cerca il testo completoCybersecurity activities at NIST's Information Technology Laboratory: Hearing before the Subcommittee on Technology and Innovation, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, first session, October 22, 2009. Washington: U.S. G.P.O., 2010.
Cerca il testo completoUnited States. Government Accountability Office. Financial management: Challenges in meeting requirements of the improper payments information act : report to the Chairman, Subcommittee on Government Management, Finance, and Accountability, Committee on Government Reform, House of Representatives. Washington, D.C: GAO, 2005.
Cerca il testo completoRusskevich, Evgeniy. Criminally-legal counteraction to crimes committed through the use of modern information and communication technologies. ru: INFRA-M Academic Publishing LLC., 2017. http://dx.doi.org/10.12737/24712.
Testo completoSubcommittee, United States Congress House Committee on Government Operaions Legislation and National Security. Computer Security Research and Training Act of 1985: Hearing before a subcommittee of the Committee on Government Operations, House of Representatives, Ninety-ninth Congress, first session, on H.R. 2889 ... September 18, 1985. Washington: U.S. G.P.O., 1986.
Cerca il testo completoService standards at the Postal Service: Are customers getting what they paid for? : hearing before the Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Tenth Congress, first session, August 2, 2007. Washington: U.S. G.P.O., 2008.
Cerca il testo completoUnited States. Government Accountability Office. Homeland Security: Guidance and standards are needed for measuring the effectiveness of agencies' facility protection efforts : report to the Chairman, Committee on Government Reform, House of Representatives. Washington, D.C: U.S. Government Accountability Office, 2006.
Cerca il testo completoNational Institute of Standards and Technology (U.S.). Secure hash standard. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 1995.
Cerca il testo completo), National Institute of Standards and Technology (U S. Secure hash standard. Gaithersburg, MD: Information Technology Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 2002.
Cerca il testo completoNational Institute of Standards and Technology (U.S.). Secure hash standard. Gaithersburg, MD: Information Technology Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 2002.
Cerca il testo completo), National Institute of Standards and Technology (U S. Secure hash standard. Gaithersburg, MD: Information Technology Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 2002.
Cerca il testo completoNational Institute of Standards and Technology (U.S.). Secure hash standard. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 1995.
Cerca il testo completo