Engineering principles for information technology security (a baseline for achieving security) : recommendations of the National Institute of Standards and Technology / / Gary Stoneburner, Clark Hayden, Alexis Feringa |
Autore | Stoneburner Gary |
Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2001 |
Descrizione fisica | 1 online resource |
Altri autori (Persone) |
FeringaAlexis
HaydenClark StoneburnerGary |
Collana | NIST special publication |
Soggetto non controllato |
Computer security
Engineering principles IT security Security baseline |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Engineering principles for information technology security |
Record Nr. | UNINA-9910711179803321 |
Stoneburner Gary | ||
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2001 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Governance and internal controls for cutting edge IT / / Karen F. Worstell |
Autore | Worstell Karen F |
Edizione | [1st edition] |
Pubbl/distr/stampa | Ely, Cambridgeshire : , : IT Governance Publishing, , 2013 |
Descrizione fisica | 1 online resource (133 p.) |
Disciplina | 650.11 |
Soggetto topico |
Business enterprises - Information technology - Management
Business enterprises - Information technology - Security measures Information technology - Management Information technology - Security measures |
Soggetto non controllato |
COBIT 5.
COBIT IT controls IT governance IT security risks IT security |
ISBN |
1-84928-454-7
1-299-46854-3 1-84928-453-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cutting edge IT -- Governance -- Legislative and regulatory compliance concerns -- Getting the business case right -- Service level management -- Security and control approach -- Data management -- Business continuity and recovery -- Secure IT-enabled organizations. |
Record Nr. | UNINA-9910815368403321 |
Worstell Karen F | ||
Ely, Cambridgeshire : , : IT Governance Publishing, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
IT-Sicherheit : Eine Einführung / / Roland Hellmann |
Autore | Hellmann Roland |
Pubbl/distr/stampa | Berlin ; ; Boston : , : De Gruyter Oldenbourg, , [2018] |
Descrizione fisica | 1 online resource (205 pages) |
Disciplina | 658.4038 |
Collana | De Gruyter Studium |
Soggetto topico |
Information technology - Management
Computer networks - Security measures Database security |
Soggetto non controllato |
IT security
cryptology cyber security data security information security |
ISBN |
3-11-049208-3
3-11-049485-X |
Classificazione | PZ 4500 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ger |
Nota di contenuto | Frontmatter -- Inhalt -- 1. Grundlagen und Motivation -- 2. Symmetrische Verschlüsselung -- 3. Public Key-Verfahren -- 4. Kryptografische Hashfunktionen -- 5. Digitale Signaturen -- 6. Weitere Anwendungen und abschließende Betrachtungen zur Kryptografie -- 7. Verfügbarkeit -- 8. Internetsicherheit -- 9. Firewalls -- 10. IoT-Sicherheit -- 11. Lösungen zu den Aufgaben -- Literatur -- Stichwortverzeichnis |
Record Nr. | UNINA-9910796783703321 |
Hellmann Roland | ||
Berlin ; ; Boston : , : De Gruyter Oldenbourg, , [2018] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
IT-Sicherheit : Eine Einführung / / Roland Hellmann |
Autore | Hellmann Roland |
Pubbl/distr/stampa | Berlin ; ; Boston : , : De Gruyter Oldenbourg, , [2018] |
Descrizione fisica | 1 online resource (205 pages) |
Disciplina | 658.4038 |
Collana | De Gruyter Studium |
Soggetto topico |
Information technology - Management
Computer networks - Security measures Database security |
Soggetto non controllato |
IT security
cryptology cyber security data security information security |
ISBN |
3-11-049208-3
3-11-049485-X |
Classificazione | PZ 4500 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ger |
Nota di contenuto | Frontmatter -- Inhalt -- 1. Grundlagen und Motivation -- 2. Symmetrische Verschlüsselung -- 3. Public Key-Verfahren -- 4. Kryptografische Hashfunktionen -- 5. Digitale Signaturen -- 6. Weitere Anwendungen und abschließende Betrachtungen zur Kryptografie -- 7. Verfügbarkeit -- 8. Internetsicherheit -- 9. Firewalls -- 10. IoT-Sicherheit -- 11. Lösungen zu den Aufgaben -- Literatur -- Stichwortverzeichnis |
Record Nr. | UNINA-9910810394903321 |
Hellmann Roland | ||
Berlin ; ; Boston : , : De Gruyter Oldenbourg, , [2018] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|