Warning: Undefined array key -1 in /home/clients/0de9ff9beee4541cf1f61437ce7bce2b/web/hec/inc/html.php on line 1458

Différences

Ci-dessous, les différences entre deux révisions de la page.

Lien vers cette vue comparative

Les deux révisions précédentes Révision précédente
Prochaine révision
Révision précédente
si:management_de_la_securite_des_technologies_de_l_information [d-m-Y H:i]
92.104.65.23
si:management_de_la_securite_des_technologies_de_l_information [d-m-Y H:i] (Version actuelle)
83.76.193.54
Ligne 1: Ligne 1:
-====== management de la securite des technologies de l information ======+====== Management de la sécurité des technologies de l'information ====== 
 + 
 +{{is:securite.pdf|Examen 2007}} 
 + 
 +{{si:resume_livre.pdf|Résumé livre}}
  
 ===== Documents ===== ===== Documents =====
  
  
-Résumés ([[http://www.doodle.ch/participation.html?pollId=kv956zki87qezp48|lien doodle]])+Résumés articles ([[http://www.doodle.ch/participation.html?pollId=kv956zki87qezp48|lien doodle]])
  
  
Ligne 27: Ligne 31:
 - {{si:Information Security is Information Risk Management.pdf|Information Security is Information Risk Management}} - {{si:Information Security is Information Risk Management.pdf|Information Security is Information Risk Management}}
  
-- Risk Analysis and Risk Management+{{si:analyse_des_risques_et_managenement_des_risques.pdf|Risk Analysis and Risk Management}}
  
 - Efficient Security Measurements and Metrics for Risk Assessment - Efficient Security Measurements and Metrics for Risk Assessment
Ligne 35: Ligne 39:
 - Measurement Model for Information System Management - Measurement Model for Information System Management
  
-Formulating information systems risk management strategies through cultural theory+{{si:formulating_is_risk_mangement_through_cultural_theory.pdf|formulating is risk management through cultural theory}}
  
 - {{si:resume_fivedimensionsofinformationsecurityawereness.pdf|Five Dimensions of Information Security Awareness}} - {{si:resume_fivedimensionsofinformationsecurityawereness.pdf|Five Dimensions of Information Security Awareness}}
Ligne 46: Ligne 50:
 }} }}
  
-- A cyclic approach to business continuity planning+{{cyclicapproach2bcp.pdf | A cyclic approach to business continuity planning}}
  
 - {{si:resume_the_conceptofsecurityandtrustinelectronicpayments.pdf|The concept of security and trust in electronic payments}} - {{si:resume_the_conceptofsecurityandtrustinelectronicpayments.pdf|The concept of security and trust in electronic payments}}
Ligne 55: Ligne 59:
  
 - {{is:mots_de_passe.pdf|Les mots de passe}} - {{is:mots_de_passe.pdf|Les mots de passe}}
 +
 +- {{si:formulating_is_risk_mangement_through_cultural_theory.pdf|formulating_is_risk_mangement_through_cultural_theory}}
si/management_de_la_securite_des_technologies_de_l_information.1212485575.txt.gz · Dernière modification: d-m-Y H:i de 92.104.65.23
chimeric.de = chi`s home Creative Commons License Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0 Fristcher.ch