Search

Your search keyword '"Certified Information Systems Security Professional"' showing total 568 results

Search Constraints

Start Over You searched for: Descriptor "Certified Information Systems Security Professional" Remove constraint Descriptor: "Certified Information Systems Security Professional"
568 results on '"Certified Information Systems Security Professional"'

Search Results

1. An Interview with Maria Vello: Chief Executive Officer of the Cyber Defence Alliance (CDA)

2. ASCAA: API‐level security certification of android applications

3. Information Security Management System

4. INTERNATIONAL STANDARDIZATION AND INFORMATION SECURITY

5. Aspects regarding the implementation of information security standards in organizations

6. Standardization in Information Technology Security

7. System-Agnostic Security Domains for Understanding and Prioritizing Systems Security Engineering Efforts

8. The Security Development Lifecycle in the Context of Accreditation Policies and Standards

9. 2020 Ecurity Review: A Year That Shook It

10. It Is All about Control

11. Message from IEEE TrustCom 2019 General Chairs

13. Cybersecurity Certification: Certified Information Systems Security Professional (CISSP)

14. An Information Security Model for Implementing the New ISO 27001

15. Implementing Practical Risk Control Using U.S. Government Standards

16. Research Trends in Economic Effects of Information Security Certification: Focused on the ISMS (Information Security Management System)

17. A Maturity Level Framework for Measurement of Information Security Performance

18. Improvement of the Certification Model for Enhancing Information Security Management Efficiency for the Financial Sector

19. A Study on Quantitative Method of Certificate for Information Security Education Course in the Private Sector

20. Rethinking the Role of Security in Undergraduate Education

21. Four Software Security Findings

22. CISSP, Eighth Edition

23. International Security in the Asia-Pacific

25. Analysis of Standard Security Technology for Security of the Network

26. Security Information and Risk Management Assessment

27. The principles of classified Information Security Management System organisation within the realisation of European Defence Agency research projects (personnel and facility security aspects)

28. Security experts’ capability design for future internet of things platform

29. A Concise Model to Evaluate Security of SCADA Systems based on Security Standards

30. Cryptography Basics: Becoming a CISSP

32. NIST Bases Flagship Security Engineering Publication on ISO/IEC/IEEE 15288:2015

33. Formal Specification of Security Guidelines for Program Certification

34. Security compliance of test systems — A practical approach

35. Information security evaluation using KAMI index for security improvement in BMKG

36. Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical Systems

37. Cloud Standards in Comparison: Are New Security Frameworks Improving Cloud Security?

38. Software Certification in Practice: How Are Standards Being Applied?

39. IT Security and Privacy Standards in Comparison: Improving FedRAMP Authorization for Cloud Service Providers

40. MTCS for Healthcare

41. Information Security Policy Projects

42. Information Security Maturity Model for Nist Cyber Security Framework

43. Establishing an Identification Program for Employees, Business Partners, Customers, and Other Visitors

44. Standards and Security

45. A model-driven approach to information security compliance

46. Technical Security Systems

47. How Women Can Succeed in the Security Industry?

48. ISO/IEC Competence Requirements for Information Security Professionals

49. Security Certification and Standards Implementation

50. The Power of Certification

Catalog

Books, media, physical & digital resources