|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 13 occurrences of 13 keywords
|
|
|
Results
Found 19 publication records. Showing 19 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
119 | Yeu-Pong Lai, Jui-Heng Tai |
Network Security Improvement with Isolation Implementation Based on ISO-17799 Standard. |
NBiS |
2007 |
DBLP DOI BibTeX RDF |
Network isolation, Physical and environmental security, Security network control, Segregation in networks, Sensitive system isolation, ISO-17799 |
54 | Cynthia Hoxey, Daniel Shoemaker 0001 |
Navigating the Information Security Landscape: Mapping the Relationship Between ISO 15408: 1999 and ISO 17799: 2000. |
AMCIS |
2005 |
DBLP BibTeX RDF |
|
46 | Greg Goth, Terry Costlow |
In the News. |
IEEE Softw. |
2005 |
DBLP DOI BibTeX RDF |
research funding, multidisciplinary research, ISO 17799, P1700, computer security, computer science, National Science Foundation, DARPA, NIST |
42 | Yeu-Pong Lai, Ruan-Han Dai |
The implementation guidance for practicing network isolation by referring to ISO-17799 standard. |
Comput. Stand. Interfaces |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Mohammad Saad Saleh, Abdullah Alrabiah, Saad Haj Bakry |
Using ISO 17799: 2005 information security management: a STOPE view with six sigma approach. |
Int. J. Netw. Manag. |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Ming-Chang Lee, To Chang |
Applying ISO 17799: 2005 in information security management. |
Int. J. Serv. Stand. |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Mohamed Saad Saleh, Abdullah Alrabiah, Saad Haj Bakry |
A STOPE model for the investigation of compliance with ISO 17799-2005. |
Inf. Manag. Comput. Secur. |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Andrew R. McGee, Frank A. Bastry, Uma Chandrashekhar, S. Rao Vasireddy, Lori A. Flynn |
Using the Bell Labs security framework to enhance the ISO 17799/27001 information security management system. |
Bell Labs Tech. J. |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Daniel Rudolph, Norbert Book |
IT-Sicherheitsmanagement als messbare Dienstleistung - Wer ITIL sagt, sagt auch ISO 17799? |
Datenschutz und Datensicherheit |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Dwight A. Haworth, Leah Rose Pietron |
Sarbanes-Oxley: Achieving Compliance by Starting with ISO 17799. |
Inf. Syst. Manag. |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Bilge Karabacak, Ibrahim Sogukpinar |
A quantitative method for ISO 17799 gap analysis. |
Comput. Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Qingxiong Ma, J. Michael Pearson |
ISO 17799: "Best Practices" in Information Security Management? |
Commun. Assoc. Inf. Syst. |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Basie von Solms |
Information Security governance: COBIT or ISO 17799 or both? |
Comput. Secur. |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Thomas R. Peltier |
Preparing for ISO 17799. |
Inf. Secur. J. A Glob. Perspect. |
2003 |
DBLP DOI BibTeX RDF |
|
42 | W. J. Brooks, Matthew J. Warren, William Hutchinson |
ISO 17799 and Australian Healthcare Organisations. |
SEC |
2003 |
DBLP BibTeX RDF |
|
42 | Elmari Pretorius, Basie von Solms |
Information Security Governance using ISO 17799 and COBIT. |
IICIS |
2003 |
DBLP DOI BibTeX RDF |
|
31 | William R. Claycomb, Dongwan Shin |
Enabling mobility in enterprise security management. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Anirban Sengupta, Mridul Sankar Barik |
Towards a Formal Specification Method for Enterprise Information System Security. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Jinx P. Walton |
Developing an enterprise information security policy. |
SIGUCCS |
2002 |
DBLP DOI BibTeX RDF |
security, network security, policies, network management, data security, regulation, compliance, unauthorized access |
Displaying result #1 - #19 of 19 (100 per page; Change: )
|
|