ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
PKI and Entitlement — Key Information Security Management Solutions for Business and IT Compliance
ISSE/SECURE 2007 Securing Electronic Business Processes
◽
10.1007/978-3-8348-9418-2_40
◽
2007
◽
pp. 376-385
◽
Cited By ~ 1
Author(s):
Guido v. d. Heidt
◽
Reinhard Schoepf
Keyword(s):
Information Security
◽
Security Management
◽
Information Security Management
◽
It Compliance
Download Full-text
Related Documents
Cited By
References
Information Security Management of a Commercial Enterprise
Central Ukrainian Scientific Bulletin. Economic Sciences
◽
10.32515/2663-1636.2019.3(36).219-228
◽
2019
◽
pp. 219-228
Author(s):
Volodymyr Panchenko
◽
Keyword(s):
Information Security
◽
Security Management
◽
Information Security Management
◽
Commercial Enterprise
Download Full-text
VISUALIZATION OF INFORMATION SECURITY MANAGEMENT PROCESSES
Scientific Visualization
◽
10.26583/sv.9.5.10
◽
2017
◽
Vol 9
(5)
◽
pp. 117-136
Author(s):
N.G. Miloslavskaya
◽
A.I. Tolstoy
Keyword(s):
Information Security
◽
Security Management
◽
Information Security Management
◽
Management Processes
Download Full-text
Information security management
10.3403/02217202
◽
1999
◽
Keyword(s):
Information Security
◽
Security Management
◽
Information Security Management
Download Full-text
Information technology. Code of practice for information security management
10.3403/02199211u
◽
2015
◽
Keyword(s):
Information Technology
◽
Information Security
◽
Security Management
◽
Information Security Management
◽
Code Of Practice
Download Full-text
Information security management. Code of practice for information security management
10.3403/02474868
◽
1999
◽
Keyword(s):
Information Security
◽
Security Management
◽
Information Security Management
◽
Code Of Practice
Download Full-text
Information security management systems
10.3403/30125022
◽
2006
◽
Keyword(s):
Information Security
◽
Security Management
◽
Management Systems
◽
Information Security Management
Download Full-text
Information technology. Security techniques. Information security management. Measurement
10.3403/30134765
◽
2010
◽
Keyword(s):
Information Technology
◽
Information Security
◽
Security Management
◽
Information Security Management
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Information security management systems. Overview and vocabulary
10.3403/30146240u
◽
2015
◽
Keyword(s):
Information Technology
◽
Information Security
◽
Security Management
◽
Management Systems
◽
Information Security Management
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Guidelines for information security management systems auditing
10.3403/30162770
◽
2011
◽
Keyword(s):
Information Technology
◽
Information Security
◽
Security Management
◽
Management Systems
◽
Information Security Management
◽
Information Technology Security
Download Full-text
Health informatics. Information security management for remote maintenance of medical devices and medical information systems
10.3403/30203776u
◽
2015
◽
Keyword(s):
Information Systems
◽
Information Security
◽
Medical Devices
◽
Health Informatics
◽
Medical Information
◽
Security Management
◽
Information Security Management
◽
Medical Information Systems
◽
Remote Maintenance
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close