Cargando…
Information security evaluation: a holistic approach
<P>What is Information Security?<BR>Risk Management versus Security Management<BR>Information Security Assurance: an Assessment Model<BR>Evaluating the Organizational Dimension<BR>Evaluating the Functional Dimension<BR>Evaluating the Human Dimension<BR>Evalu...
Autores principales: | , |
---|---|
Lenguaje: | eng |
Publicado: |
EPFL Press
2011
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1396548 |
_version_ | 1780923531849105408 |
---|---|
author | Tashi, Igli Ghernaouti-Hélie, Solange |
author_facet | Tashi, Igli Ghernaouti-Hélie, Solange |
author_sort | Tashi, Igli |
collection | CERN |
description | <P>What is Information Security?<BR>Risk Management versus Security Management<BR>Information Security Assurance: an Assessment Model<BR>Evaluating the Organizational Dimension<BR>Evaluating the Functional Dimension<BR>Evaluating the Human Dimension<BR>Evaluating the Compliance Dimension<BR>Concluding Remarks<BR>Bibliography <BR>Index of Keywords and Concepts</P> |
id | cern-1396548 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2011 |
publisher | EPFL Press |
record_format | invenio |
spelling | cern-13965482021-04-22T00:48:40Zhttp://cds.cern.ch/record/1396548engTashi, IgliGhernaouti-Hélie, SolangeInformation security evaluation: a holistic approachComputing and Computers<P>What is Information Security?<BR>Risk Management versus Security Management<BR>Information Security Assurance: an Assessment Model<BR>Evaluating the Organizational Dimension<BR>Evaluating the Functional Dimension<BR>Evaluating the Human Dimension<BR>Evaluating the Compliance Dimension<BR>Concluding Remarks<BR>Bibliography <BR>Index of Keywords and Concepts</P>EPFL Pressoai:cds.cern.ch:13965482011 |
spellingShingle | Computing and Computers Tashi, Igli Ghernaouti-Hélie, Solange Information security evaluation: a holistic approach |
title | Information security evaluation: a holistic approach |
title_full | Information security evaluation: a holistic approach |
title_fullStr | Information security evaluation: a holistic approach |
title_full_unstemmed | Information security evaluation: a holistic approach |
title_short | Information security evaluation: a holistic approach |
title_sort | information security evaluation: a holistic approach |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1396548 |
work_keys_str_mv | AT tashiigli informationsecurityevaluationaholisticapproach AT ghernaoutiheliesolange informationsecurityevaluationaholisticapproach |