-
1
-
-
34248336539
-
-
Björck F. Security Scandinavian style. Licentiate thesis, Stockholm University & Royal Institue of Technology; 2001.
-
-
-
-
2
-
-
0009687432
-
A methodology for the development of secure application systems
-
Eloff J.H.P., and von Solms S.H. (Eds), IFIP, Chapman & Hall. ASSDM
-
Booysen H., and Eloff J. A methodology for the development of secure application systems. In: Eloff J.H.P., and von Solms S.H. (Eds). Information security - the next decade (1995), IFIP, Chapman & Hall. ASSDM 255-269
-
(1995)
Information security - the next decade
, pp. 255-269
-
-
Booysen, H.1
Eloff, J.2
-
3
-
-
0003407933
-
-
Addison Wesley Longman [Anniversary edition]
-
Brooks F.P.J. The mythical man-month (1995), Addison Wesley Longman [Anniversary edition]
-
(1995)
The mythical man-month
-
-
Brooks, F.P.J.1
-
5
-
-
34248353385
-
-
DTI, Coopers PW. Information security breaches survey 2004 technical report. Technical report, DTI, 2004.
-
-
-
-
6
-
-
34248400287
-
-
EUD 95/46/EC. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. European Union, 1995.
-
-
-
-
7
-
-
0013176783
-
IT-security and privacy: design and use of privacy-enhancing security mechanisms
-
Springer
-
Fischer-Hübner S. IT-security and privacy: design and use of privacy-enhancing security mechanisms. Lecture Notes in Computer Science (2001), Springer
-
(2001)
Lecture Notes in Computer Science
-
-
Fischer-Hübner, S.1
-
8
-
-
8644292339
-
Achieving an integrated design: the way forward for information security
-
Eloff J.H.P., and von Solms S.H. (Eds), IFIP, Chapman & Hall
-
Hitchings J. Achieving an integrated design: the way forward for information security. In: Eloff J.H.P., and von Solms S.H. (Eds). Information security - the next decade (1995), IFIP, Chapman & Hall 369-383
-
(1995)
Information security - the next decade
, pp. 369-383
-
-
Hitchings, J.1
-
9
-
-
1842709005
-
The use of business process models for security design in organisations
-
Katzikas S., and Gritzalis D. (Eds), Chapman & Hall, London
-
Holbein R., Teufel S., and Bauknecht K. The use of business process models for security design in organisations. In: Katzikas S., and Gritzalis D. (Eds). Information systems security: facing the information society of the 21st century, IFIP SEC 96 (1996), Chapman & Hall, London
-
(1996)
Information systems security: facing the information society of the 21st century, IFIP SEC 96
-
-
Holbein, R.1
Teufel, S.2
Bauknecht, K.3
-
10
-
-
34248325546
-
-
ISO 17799. ISO/IEC 17799:2000. Information technology - ode of practice for information security management, International Organization for Standardization; 2000.
-
-
-
-
11
-
-
34248392945
-
-
ISO 27001. ISO/IEC 27001:2005. Information technology - security techniques - information security management systems - requirements, International Organization for Standardization; 2005.
-
-
-
-
12
-
-
34248349415
-
-
ISO 9000. ISO/IEC 9000:2000. Quality management systems - fundamentals and vocabulary, International Organization for Standardization; 2000.
-
-
-
-
14
-
-
0036037169
-
-
Jürjens J. Using umlsec and goal-trees for secure systems development. In: Symposium of applied computing (SAC 2002); 2002. p. 1026-31.
-
-
-
-
16
-
-
0035506385
-
Extreme programming from a CMM perspective
-
Paulk M. Extreme programming from a CMM perspective. IEEE Software 18 6 (2001) 19-26
-
(2001)
IEEE Software
, vol.18
, Issue.6
, pp. 19-26
-
-
Paulk, M.1
-
17
-
-
34248377673
-
-
Paulk MC, Curtis B, Chrissis MB, Weber CV. Capability maturity model - SE. Version 1.1, Technical report, Software Engineering Institute; 1993.
-
-
-
-
19
-
-
34248371105
-
-
SSE-CMM. Systems security engineering capability maturity model. SSE-CMM Project, v. 3.0 edition; 2003.
-
-
-
-
20
-
-
0038205942
-
An integral framework for information systems security management
-
Trcek D. An integral framework for information systems security management. Computers & Security 22 4 (2003) 337-360
-
(2003)
Computers & Security
, vol.22
, Issue.4
, pp. 337-360
-
-
Trcek, D.1
-
22
-
-
0034814690
-
Information security - a multidimensional discipline
-
von Solms B. Information security - a multidimensional discipline. Computer & Security 20 (2001) 504-508
-
(2001)
Computer & Security
, vol.20
, pp. 504-508
-
-
von Solms, B.1
-
23
-
-
1242263785
-
Holistic security requirement engineering for electronic commerce
-
Zuccato A. Holistic security requirement engineering for electronic commerce. Computers & Security 23 1 (2004) 63-76
-
(2004)
Computers & Security
, vol.23
, Issue.1
, pp. 63-76
-
-
Zuccato, A.1
-
24
-
-
84885059632
-
-
Zuccato A. A decision matrix approach to prioritize holistic security requirements in e-commerce. In: 20th IFIP information security conference - security and privacy in the age of ubiquitous computing. IFIP TC 11; 2005a.
-
-
-
-
25
-
-
34248390832
-
-
Zuccato A. Holistic information security management framework - for electronic commerce. Doctoral thesis, Karlstad University Studies; 2005b.
-
-
-
|