Design and applications of third party integrated information security management system

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This chapter mainly analyzes the current status of information security, discusses the domestic and international trends of its technology development, and proposes the third-party integrated information security management system. And by analyzing the services used currently, it also generally introduces the application design of information security management system, such as planning and design, whole framework design, and so on. Finally the planning and the design of the system is presented. © 2012 Springer Science+Business Media B.V.

Cite

CITATION STYLE

APA

Fang, Y., Wang, X., & Gao, F. (2012). Design and applications of third party integrated information security management system. In Lecture Notes in Electrical Engineering (Vol. 107 LNEE, pp. 367–376). https://doi.org/10.1007/978-94-007-1839-5_39

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free