-
1
-
-
50349085168
-
-
Information Security Breaches Survey
-
PricewaterhouseCoopers and DTI, "Information Security Breaches Survey," http://www.pwc.com/uk/eng/ins-sol/publ/pwc_dti- fullsurveyresults06.pdf, 2006.
-
(2006)
PricewaterhouseCoopers and DTI
-
-
-
2
-
-
50349103122
-
-
Australian Computer Emergency Response Team, Australian Computer Crime and Security Survey. http://www.auscert.org.au/render.html?it= 2001&template=1, 2006, accessed 08/2007. [Online]. Available: http://www.auscert.org.au/render.html?it=2001
-
Australian Computer Emergency Response Team, "Australian Computer Crime and Security Survey." http://www.auscert.org.au/render.html?it= 2001&template=1, 2006, accessed 08/2007. [Online]. Available: http://www.auscert.org.au/render.html?it=2001
-
-
-
-
4
-
-
50349098286
-
-
BSI Federal Office for Information Security, Online, Available
-
BSI (Federal Office for Information Security), "IT-Grundschutz Manual (english version)." 2004. [Online]. Available: http://www.bsi.de/ english/gshb/manual/download/index.html
-
(2004)
IT-Grundschutz Manual (english version)
-
-
-
7
-
-
0346245772
-
Semantische Prozeß-modellierung auf der Grundlage Ereignisgesteuerter Prozeßketten (EPK)
-
Online, Available
-
A. W. Scheer, G. Keller, and M. Nüttgens, "Semantische Prozeß-modellierung auf der Grundlage Ereignisgesteuerter Prozeßketten (EPK)." Veröffentlichungen des Instituts für Wirtschaftsinformatik, Heft 89. Saarbrücken, 1992. [Online]. Available: http://www.iwi.uni-sb.de/nuettgens/Veroef/Artikel/heft089/heft089.pdf
-
(1992)
Veröffentlichungen des Instituts für Wirtschaftsinformatik, Heft 89. Saarbrücken
-
-
Scheer, A.W.1
Keller, G.2
Nüttgens, M.3
-
8
-
-
0011657401
-
-
Springer, Berlin, eh. Introduction to Business Process Management Systems Concepts, pp
-
D. Karagiannis, S. Junginger. and R. Strobl, Business Process Modelling. Springer, Berlin. 1996, eh. Introduction to Business Process Management Systems Concepts, pp. 81-106.
-
(1996)
Business Process Modelling
, pp. 81-106
-
-
Karagiannis, D.1
Junginger, S.2
Strobl, R.3
-
11
-
-
38149119243
-
Good Practice Guidelines
-
Business Continuity Institute, Online, Available:, http://www.thebci.org
-
Business Continuity Institute, "Good Practice Guidelines," http://www.thebci.org/gpgdownloadpage.htm, 2005. [Online]. Available: http://www.thebci.org
-
(2005)
-
-
-
12
-
-
49049121750
-
Good Practice Guidelines
-
Online, Available:, http://www.thebci.org
-
_, "Good Practice Guidelines," http://www.thebci.org/ gpgdownloadpage.htm, 2007. [Online]. Available: http://www.thebci.org
-
(2007)
-
-
-
13
-
-
50349091634
-
-
British Standards Institute, Bs 25999, http://www.bsonline. bsiglobal.com/server/index.jsp, 2006.
-
British Standards Institute, "Bs 25999," http://www.bsonline. bsiglobal.com/server/index.jsp, 2006.
-
-
-
-
14
-
-
50349099439
-
-
CERT, Online, Available
-
CERT, "OCTAVE," 2005. [Online]. Available: http://www.cert.org/ octave
-
(2005)
-
-
-
19
-
-
50349088327
-
-
DePaul University - Information Security Team. A framework for incident response (draft), DePaul University (https://infosec.depaul.edu/) , December 2002. [Online]. Available: http://is.depaul.edu/\_ downloads/6\_irtfwk.pdf
-
DePaul University - Information Security Team. "A framework for incident response (draft)," DePaul University (https://infosec.depaul.edu/) , December 2002. [Online]. Available: http://is.depaul.edu/\_downloads/6\
-
-
-
-
20
-
-
33746748784
-
On incident handling and response: A state-of-the-art approach
-
S. Mitropoulos, D. Patsos, and C. Douligeris, "On incident handling and response: A state-of-the-art approach." Elsevier - Computer & Security, vol. 25, pp. 351-370, 2006.
-
(2006)
Elsevier - Computer & Security
, vol.25
, pp. 351-370
-
-
Mitropoulos, S.1
Patsos, D.2
Douligeris, C.3
-
21
-
-
50349103451
-
-
Office of Management and Budget, Online, Available:, http://www.whitehouse.gov/onib/circulars/a130/a130trans4.html
-
Office of Management and Budget, "Circular no. a-130," White House (http://www.whitehouse.gov/omb/circulars/a130/a130trans4.html). [Online]. Available: http://www.whitehouse.gov/onib/circulars/a130/a130trans4.html
-
Circular no. a-130
-
-
-
22
-
-
50349083499
-
-
US States Code, Chapter 35 of title 44, subchapter iii - information security, Federal Information Security Management Act (FISMA), 2002.
-
US States Code, "Chapter 35 of title 44, subchapter iii - information security," Federal Information Security Management Act (FISMA), 2002.
-
-
-
-
23
-
-
50349094880
-
-
BSI Federal Office for Information Security, Online, Available
-
BSI (Federal Office for Information Security), "BSI Standardsl (english version)," 2007. [Online]. Available: http://www.bsi.bund.de/ english/publications/bsi\_standards/index.htm
-
(2007)
BSI Standardsl (english version)
-
-
|