Information Security governance: COBIT or ISO 17799 or both? (English)
- New search for: von Solms, B.
- New search for: von Solms, B.
In:
COMPUTERS AND SECURITY
;
24
, 2
;
99-104
;
2005
-
ISSN:
- Article (Journal) / Print
-
Title:Information Security governance: COBIT or ISO 17799 or both?
-
Contributors:von Solms, B. ( author )
-
Published in:COMPUTERS AND SECURITY ; 24, 2 ; 99-104
-
Publisher:
- New search for: Elsevier Science B.V., Amsterdam.
-
Publication date:2005-01-01
-
Size:6 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 005.8
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 005.8 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 24, Issue 2
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 87
-
Search engines: a growing contributor to security riskSchultz, Dr Eugene et al. | 2005
- 89
-
Lycos crosses the lineSchultz, Dr Eugene et al. | 2004
- 91
-
Security views: Malware Update| 2005
- 99
-
Information Security governance: COBIT or ISO 17799 or both?von Solms, Basie et al. | 2005
- 105
-
The economic approach of information securityTsiakis, Theodosios / Stephanides, George et al. | 2005
- 109
-
Keyjacking: the surprising insecurity of client-side SSLMarchesini, John / Smith, S.W. / Zhao, Meiyuan et al. | 2004
- 124
-
Analysis of end user security behaviorsStanton, Jeffrey M. / Stam, Kathryn R. / Mastrangelo, Paul / Jolton, Jeffrey et al. | 2004
- 134
-
Cryptanalyses of two key assignment schemes based on polynomial interpolationsWang, Shyh-Yih / Laih, Chi Sung et al. | 2004
- 139
-
Dealing with packet loss in the Interactive Chained Stream Authentication protocolBergadano, Francesco / Cavagnino, Davide et al. | 2004
- 147
-
ISRAM: information security risk analysis methodKarabacak, Bilge / Sogukpinar, Ibrahim et al. | 2004
- 160
-
Empirical evaluation of SVM-based masquerade detection using UNIX commandsKim, Han-Sung / Cha, Sung-Deok et al. | 2004
- 169
-
An improvement on efficient anonymous auction protocolsJiang, Rui / Pan, Li / Li, Jian-Hua et al. | 2004