Attributes | Values |
---|
rdf:type
| |
Description
| - A comprehensive and integrated view on the security of an Information System considering all its parts (hardware, software, human factor, data, and the impact of real world) is presented in the chapter. The security of information systems cannot be solved only by management of Information Technologies, because Information Technologies constitute only a part of Information System. The design of a well-implemented information security management system is the reliable way towards the safety of information in a company or in an institution. Integrated approach to the security of an Information System is introduced, and recommendations for managing the security of the Information System are given.
- A comprehensive and integrated view on the security of an Information System considering all its parts (hardware, software, human factor, data, and the impact of real world) is presented in the chapter. The security of information systems cannot be solved only by management of Information Technologies, because Information Technologies constitute only a part of Information System. The design of a well-implemented information security management system is the reliable way towards the safety of information in a company or in an institution. Integrated approach to the security of an Information System is introduced, and recommendations for managing the security of the Information System are given. (en)
|
Title
| - Information System Integrated Security
- Information System Integrated Security (en)
|
skos:prefLabel
| - Information System Integrated Security
- Information System Integrated Security (en)
|
skos:notation
| - RIV/61989100:27510/12:86082069!RIV13-MSM-27510___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/61989100:27510/12:86082069
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - user protection; security policy; security of information system; real world; information security management system; components of information system; attacks against information technologies (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - Strategic and practical approaches for information security governance : technologies and applied solutions
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...v/pocetStranKnihy
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| |
number of pages
| |
http://bibframe.org/vocab/doi
| - 10.4018/978-1-4666-0197-0.ch009
|
http://purl.org/ne...btex#hasPublisher
| - Information Science Reference
|
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |