ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Information technology. Security techniques. Information security management systems. Overview and vocabulary
Mapping Intimacies
◽
10.3403/30146240u
◽
2015
◽
Keyword(s):
Information Technology
◽
Information Security
◽
Security Management
◽
Management Systems
◽
Information Security Management
◽
Information Technology Security
Download Full-text
Related Documents
Cited By
References
Information technology. Security techniques. Guidelines for information security management systems auditing
10.3403/30162770
◽
2011
◽
Keyword(s):
Information Technology
◽
Information Security
◽
Security Management
◽
Management Systems
◽
Information Security Management
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Competence requirements for information security management systems professionals
10.3403/30342674u
◽
2017
◽
Keyword(s):
Information Technology
◽
Information Security
◽
Security Management
◽
Management Systems
◽
Information Security Management
◽
Information Technology Security
Download Full-text
Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems
10.3403/30420965u
◽
2020
◽
Keyword(s):
Information Technology
◽
Information Security
◽
Security Management
◽
Management Systems
◽
Information Security Management
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Requirements for bodies providing audit and certification of information security management systems
10.3403/30148919
◽
2007
◽
Keyword(s):
Information Technology
◽
Information Security
◽
Security Management
◽
Management Systems
◽
Information Security Management
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Information security management systems. Requirements
10.3403/30192065
◽
2013
◽
Keyword(s):
Information Technology
◽
Information Security
◽
Security Management
◽
Management Systems
◽
Information Security Management
◽
Information Technology Security
◽
Systems Requirements
Download Full-text
Information technology. Security techniques. Information security management systems. Overview and vocabulary
10.3403/30284692
◽
2014
◽
Keyword(s):
Information Technology
◽
Information Security
◽
Security Management
◽
Management Systems
◽
Information Security Management
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Information security management systems. Requirements
10.3403/30126472
◽
2005
◽
Keyword(s):
Information Technology
◽
Information Security
◽
Security Management
◽
Management Systems
◽
Information Security Management
◽
Information Technology Security
◽
Systems Requirements
Download Full-text
Information technology. Security techniques. Information security management systems. Overview and vocabulary
10.3403/30236519
◽
2013
◽
Cited By ~ 1
Keyword(s):
Information Technology
◽
Information Security
◽
Security Management
◽
Management Systems
◽
Information Security Management
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Requirements for bodies providing audit and certification of information security management systems
10.3403/30246892
◽
2012
◽
Keyword(s):
Information Technology
◽
Information Security
◽
Security Management
◽
Management Systems
◽
Information Security Management
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Requirements for bodies providing audit and certification of information security management systems
10.3403/30266417
◽
2020
◽
Keyword(s):
Information Technology
◽
Information Security
◽
Security Management
◽
Management Systems
◽
Information Security Management
◽
Information Technology Security
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close