Les deux révisions précédentes
Révision précédente
Prochaine révision
|
Révision précédente
Prochaine révision
Les deux révisions suivantes
|
si:management_de_la_securite_des_technologies_de_l_information [d-m-Y H:i] 85.5.93.112 |
si:management_de_la_securite_des_technologies_de_l_information [d-m-Y H:i] 130.223.249.240 |
- {{is:identity.digital.pdf|“ Digital Life”, Chapitre 4}} | - {{is:identity.digital.pdf|“ Digital Life”, Chapitre 4}} |
| |
- Adopting an ICT code of conduct | - {{resume_adopting_itc.pdf| Adopting an ICT code of conduct}} |
| |
- Laws and regulations affecting Information Management | - Laws and regulations affecting Information Management |
- {{si:Information Security is Information Risk Management.pdf|Information Security is Information Risk Management}} | - {{si:Information Security is Information Risk Management.pdf|Information Security is Information Risk Management}} |
| |
- Risk Analysis and Risk Management | - {{si:analyse_des_risques_et_managenement_des_risques.pdf|Risk Analysis and Risk Management}} |
| |
- Efficient Security Measurements and Metrics for Risk Assessment | - Efficient Security Measurements and Metrics for Risk Assessment |
| |
- Developing a framework for understanding Security Governance | - {{si:developing_a_framework_for_understanding_security_governance.pdf|Developing a framework for understanding security governance}} |
| |
- Measurement Model for Information System Management | - Measurement Model for Information System Management |
| |
- Formulating information systems risk management strategies through cultural theory | - {{si:formulating_is_risk_mangement_through_cultural_theory.pdf|formulating is risk management through cultural theory}} |
| |
- {{si:resume_fivedimensionsofinformationsecurityawereness.pdf|Five Dimensions of Information Security Awareness}} | - {{si:resume_fivedimensionsofinformationsecurityawereness.pdf|Five Dimensions of Information Security Awareness}} |
- The Evolution of Information Assurance | - The Evolution of Information Assurance |
| |
- The role of Business Impact Analysis and Testing in Disaster Recovery Planning by Helth Maintenance Organizations | - {{si:business_impact_analysis_and_testing.pdf|The role of Business Impact Analysis and Testing in Disaster Recovery Planning by Helth Maintenance Organizations}} |
| |
- {{si:resume_de_l_article .pdf|Résumé de l'article Business Impact Analysis and Testing}} | |
| |
- {{si:business_continuity_planning_as_a_facilities_management_tool.pdf|Business Continuity Planning as a facilities management tool | - {{si:business_continuity_planning_as_a_facilities_management_tool.pdf|Business Continuity Planning as a facilities management tool |
}} | }} |
| |
- A cyclic approach to business continuity planning | - {{cyclicapproach2bcp.pdf | A cyclic approach to business continuity planning}} |
| |
- {{si:resume_the_conceptofsecurityandtrustinelectronicpayments.pdf|The concept of security and trust in electronic payments}} | - {{si:resume_the_conceptofsecurityandtrustinelectronicpayments.pdf|The concept of security and trust in electronic payments}} |
| |
- {{is:mots_de_passe.pdf|Les mots de passe}} | - {{is:mots_de_passe.pdf|Les mots de passe}} |
| |
| - {{si:formulating_is_risk_mangement_through_cultural_theory.pdf|formulating_is_risk_mangement_through_cultural_theory}} |