Attributes | Values |
---|
rdf:type
| |
Description
| - Security is an important part of information system design and development. The security of information system (IS) cannot be solved only by management of information technologies security because information technologies constitute only a part of IS. A comprehensive and integrated view of the security of IS considering all its parts (hardware, software, human factor, data, and the impact of real world), is presented in the paper. The design of well-implemented information security management system is the reliable way towards the safety of information in a company or in an institution.
- Security is an important part of information system design and development. The security of information system (IS) cannot be solved only by management of information technologies security because information technologies constitute only a part of IS. A comprehensive and integrated view of the security of IS considering all its parts (hardware, software, human factor, data, and the impact of real world), is presented in the paper. The design of well-implemented information security management system is the reliable way towards the safety of information in a company or in an institution. (en)
|
Title
| - Information System Integrated Security
- Information System Integrated Security (en)
|
skos:prefLabel
| - Information System Integrated Security
- Information System Integrated Security (en)
|
skos:notation
| - RIV/61989100:27510/08:00016943!RIV10-MSM-27510___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/61989100:27510/08:00016943
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - integrated security; security policy; IS security management (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - IEEE Computer Information Systems and Industrial Management Applications
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| |
http://linked.open...vavai/riv/typAkce
| |
http://linked.open...ain/vavai/riv/wos
| |
http://linked.open.../riv/zahajeniAkce
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| |
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |