Ceci est une ancienne révision du document !


management de la securite des technologies de l information

Documents

Résumés (lien doodle)

- The Psychology of Security

- Clarifying the Roles of Information Security: 13 Questions the CEO, CIO, and CISO

- Information Security Management – A New Paradigm

- The Common Criteria ISO/IEC 15408

- Business and technical motivation for identity management

- “ Digital Life”, Chapitre 4

- Adopting an ICT code of conduct

- Laws and regulations affecting Information Management

- CYBERSLACKING – LEGAL AND ETHICAL ISSUES

- Information Security is Information Risk Management

- Risk Analysis and Risk Management

- Efficient Security Measurements and Metrics for Risk Assessment

- Developing a framework for understanding security governance

- Measurement Model for Information System Management

- Formulating information systems risk management strategies through cultural theory

- Five Dimensions of Information Security Awareness

- The Evolution of Information Assurance

- The role of Business Impact Analysis and Testing in Disaster Recovery Planning by Helth Maintenance Organizations

- Résumé de l'article Business Impact Analysis and Testing

- Business Continuity Planning as a facilities management tool

- A cyclic approach to business continuity planning

- The concept of security and trust in electronic payments

- Unconditionally secure cryptosystems based on Quantum Cryptography

- Les bons réflexes en cas d’intrusion sur un système d’information

- Les mots de passe

si/management_de_la_securite_des_technologies_de_l_information.1212480068.txt.gz · Dernière modification: d-m-Y H:i de 85.3.64.146
chimeric.de = chi`s home Creative Commons License Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0 Fristcher.ch