Narrow your search
Listing 1 - 4 of 4
Sort by

Book
Open Information Security Management Maturity Model (O-ISM3).
Author:
ISBN: 9087539118 Year: 2011 Publisher: Zaltbommel : Van Haren Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The O-ISM3 standard focuses on the common processes of information security. It is technology-neutral, very practical and considers the business aspect in depth. This means that practitioners can use O-ISM3 with a wide variety of protection techniques used in the marketplace. In addition it supports common frameworks such as ISO 9000, ISO 27000, COBIT and ITIL. Covers: risk management, security controls, security management and how to translate business drivers into security objectives and targets


Periodical
Journal of Electronics and Information Science.
ISSN: 23719532 23719524 Year: 2016 Publisher: Ontario, Canada ; Xinghualing District, Taiyuan, China ; Great Missenden, Buckinghamshire, UK ; Central, Hong Kong : Clausius Scientific Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"The journal promotes and expedites the dissemination of new research results.There is an exciting and large volume of research activity in the field worldwide.The goal of this journal is to provide a platform for academicians and scientists all over the world to share, promote, and discuss various new issues and developments in different areas of electronics engineering and information science"--"Aims & scope", viewed March 4, 2020.


Book
Algorithms, architectures and information systems security
Author:
ISBN: 1282442295 9786612442292 9812836241 9789812836243 9789812836236 9812836233 9781282442290 6612442298 Year: 2009 Publisher: Hackensack, NJ World Scientific

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume contains articles written by leading researchers in the fields of algorithms, architectures, and information systems security. The first five chapters address several challenging geometric problems and related algorithms. These topics have major applications in pattern recognition, image analysis, digital geometry, surface reconstruction, computer vision and in robotics. The next five chapters focus on various optimization issues in VLSI design and test architectures, and in wireless networks. The last six chapters comprise scholarly articles on information systems security coverin


Book
(ISC)² SSCP systems security certified practitioner : official study guide
Author:
ISBN: 1119855004 1119854997 9781119855002 9781119854999 Year: 2022 Publisher: Hoboken, New Jersey : John Wiley & Sons, Inc.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The only SSCP study guide officially approved by (ISC)2 The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is a well-known vendor-neutral global IT security certification. The SSCP is designed to show that holders have the technical skills to implement, monitor, and administer IT infrastructure using information security policies and procedures. This comprehensive Official Study Guide--the only study guide officially approved by (ISC)2--covers all objectives of the seven SSCP domains. Security Operations and Administration Access Controls Risk Identification, Monitoring, and Analysis Incident Response and Recovery Cryptography Network and Communications Security Systems and Application Security This updated Third Edition covers the SSCP exam objectives effective as of November 2021. Much of the new and more advanced knowledge expected of an SSCP is now covered in a new chapter "Cross-Domain Challenges." If you're an information security professional or student of cybersecurity looking to tackle one or more of the seven domains of the SSCP, this guide gets you prepared to pass the exam and enter the information security workforce with confidence.

Listing 1 - 4 of 4
Sort by