
Information technology - Guidelines for the management of IT Security Part 3: Techniques for the management of IT Security
出版:International Organization for Standardization

專家解讀視頻
Gives techniques for the management of IT security. They are based on the general guidelines that are laid out in ISO/IEC TR 13335-1 and ISO/IEC TR 13335-2. The guidelines are designed to help the implementation of IT security. Being familiar with the concepts and models introduced in ISO/IEC TR 13335-1 and the material concerned with the management and planning of IT security in ISO/IEC TR 13335-2 is important to completely understand this part of ISO/IEC TR 13335.
CSA ISO/IEC TR 13335-3:2001 - Similar
GOST R ISO/IEC TR 13335-3:2007 - Identical
INCITS/ISO/IEC TR 13335-3-1998 - Identical
JIS TR X0036-3:2001 - Identical
BS ISO/IEC TR 13335-3:1998 - Identical
NEN NPR ISO/IEC TR 13335-3:2002 - Identical
AS 13335.3-2003 - Identical
UNE 71501-3:2001 - Identical
KS X 1212-3:2007 - Identical
KS X ISO/IEC TR 13335-3:2005 - Identical
KS X ISO/IEC TR 13335-3:2013 - Identical
KS X 1212-3:2013 - Identical
CSA ISO/IEC TR 13335-3 : 2001 - Similar to
NEN NPR ISO/IEC TR 13335-3 : 2002 - Identical
BS ISO/IEC TR 13335-3 : 1998 - Identical
UNE 71501-3 : 2001 - Identical
INCITS/ISO/IEC TR 13335-3 : 1998 - Identical
GOST R ISO/IEC TR 13335-3 : 2007 - Identical
AS 13335.3-2003 - Identical
SANS 13335-3 : 1ED 2002 - Identical
INCITS/ISO/IEC TR 13335-3 : 1998 : R2007 - Identical
INCITS/ISO/IEC TR 13335-3 : 1998 - Identical
INCITS/ISO/IEC TR 13335-3 : 1998 - Identical
NEN NPR ISO/IEC TR 13335-3 : 2002 - Identical
SANS 13335-3 : 1ED 2002 - Identical
GOST R ISO/IEC TR 13335-3 : 2007 - Identical
CSA ISO/IEC TR 13335-3 : 2001 - Similar to
BS ISO/IEC TR 13335-3 : 1998 - Identical