Les deux révisions précédentes
Révision précédente
Prochaine révision
|
Révision précédente
|
si:management_de_la_securite_des_technologies_de_l_information [d-m-Y H:i] 83.76.90.103 |
si:management_de_la_securite_des_technologies_de_l_information [d-m-Y H:i] (Version actuelle) 83.76.193.54 |
====== management de la securite des technologies de l information ====== | ====== Management de la sécurité des technologies de l'information ====== |
| |
| {{is:securite.pdf|Examen 2007}} |
| |
| {{si:resume_livre.pdf|Résumé livre}} |
| |
===== Documents ===== | ===== Documents ===== |
| |
| |
Résumés ([[http://www.doodle.ch/participation.html?pollId=kv956zki87qezp48|lien doodle]]) | Résumés articles ([[http://www.doodle.ch/participation.html?pollId=kv956zki87qezp48|lien doodle]]) |
| |
| |
- {{si:Information Security is Information Risk Management.pdf|Information Security is Information Risk Management}} | - {{si:Information Security is Information Risk Management.pdf|Information Security is Information Risk Management}} |
| |
- Risk Analysis and Risk Management | - {{si:analyse_des_risques_et_managenement_des_risques.pdf|Risk Analysis and Risk Management}} |
| |
- Efficient Security Measurements and Metrics for Risk Assessment | - Efficient Security Measurements and Metrics for Risk Assessment |
}} | }} |
| |
- A cyclic approach to business continuity planning | - {{cyclicapproach2bcp.pdf | A cyclic approach to business continuity planning}} |
| |
- {{si:resume_the_conceptofsecurityandtrustinelectronicpayments.pdf|The concept of security and trust in electronic payments}} | - {{si:resume_the_conceptofsecurityandtrustinelectronicpayments.pdf|The concept of security and trust in electronic payments}} |
- {{is:reflexes_intrusions_syst_info.pdf|Les bons réflexes en cas d’intrusion sur un système d’information}} | - {{is:reflexes_intrusions_syst_info.pdf|Les bons réflexes en cas d’intrusion sur un système d’information}} |
| |
- {{is:mots_de_passe.pdf|Les mots de passe}}{{si:formulating_is_risk_mangement_through_cultural_theory.pdf|}} | - {{is:mots_de_passe.pdf|Les mots de passe}} |
| |
| - {{si:formulating_is_risk_mangement_through_cultural_theory.pdf|formulating_is_risk_mangement_through_cultural_theory}} |