H. Kersten, Gerhard Klett, J. Reuter, Klaus-Werner Schröder
{"title":"Sicherheit messen","authors":"H. Kersten, Gerhard Klett, J. Reuter, Klaus-Werner Schröder","doi":"10.1007/978-3-658-27692-8_4","DOIUrl":"https://doi.org/10.1007/978-3-658-27692-8_4","url":null,"abstract":"","PeriodicalId":290614,"journal":{"name":"IT-Sicherheitsmanagement nach der neuen ISO 27001","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132531999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Kersten, Gerhard Klett, J. Reuter, Klaus-Werner Schröder
{"title":"Einführung","authors":"H. Kersten, Gerhard Klett, J. Reuter, Klaus-Werner Schröder","doi":"10.1007/978-3-658-27692-8_1","DOIUrl":"https://doi.org/10.1007/978-3-658-27692-8_1","url":null,"abstract":"","PeriodicalId":290614,"journal":{"name":"IT-Sicherheitsmanagement nach der neuen ISO 27001","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121638667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Kersten, Gerhard Klett, J. Reuter, Klaus-Werner Schröder
{"title":"Die Anforderungen an ein ISMS","authors":"H. Kersten, Gerhard Klett, J. Reuter, Klaus-Werner Schröder","doi":"10.1007/978-3-658-14694-8_2","DOIUrl":"https://doi.org/10.1007/978-3-658-14694-8_2","url":null,"abstract":"","PeriodicalId":290614,"journal":{"name":"IT-Sicherheitsmanagement nach der neuen ISO 27001","volume":"28 2 Suppl 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131838141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Kersten, Gerhard Klett, J. Reuter, Klaus-Werner Schröder
{"title":"Interne und externe Audits","authors":"H. Kersten, Gerhard Klett, J. Reuter, Klaus-Werner Schröder","doi":"10.1007/978-3-658-14694-8_5","DOIUrl":"https://doi.org/10.1007/978-3-658-14694-8_5","url":null,"abstract":"","PeriodicalId":290614,"journal":{"name":"IT-Sicherheitsmanagement nach der neuen ISO 27001","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126722309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Kersten, Gerhard Klett, J. Reuter, Klaus-Werner Schröder
{"title":"Risikomanagement","authors":"H. Kersten, Gerhard Klett, J. Reuter, Klaus-Werner Schröder","doi":"10.1007/978-3-658-27692-8_3","DOIUrl":"https://doi.org/10.1007/978-3-658-27692-8_3","url":null,"abstract":"","PeriodicalId":290614,"journal":{"name":"IT-Sicherheitsmanagement nach der neuen ISO 27001","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114972860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Kersten, Gerhard Klett, J. Reuter, Klaus-Werner Schröder
{"title":"Interne Kontrollsysteme","authors":"H. Kersten, Gerhard Klett, J. Reuter, Klaus-Werner Schröder","doi":"10.1007/978-3-658-27692-8_9","DOIUrl":"https://doi.org/10.1007/978-3-658-27692-8_9","url":null,"abstract":"","PeriodicalId":290614,"journal":{"name":"IT-Sicherheitsmanagement nach der neuen ISO 27001","volume":"155 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125906369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Kersten, Gerhard Klett, J. Reuter, Klaus-Werner Schröder
{"title":"ISMS und mobile Infrastrukturen","authors":"H. Kersten, Gerhard Klett, J. Reuter, Klaus-Werner Schröder","doi":"10.1007/978-3-658-14694-8_7","DOIUrl":"https://doi.org/10.1007/978-3-658-14694-8_7","url":null,"abstract":"","PeriodicalId":290614,"journal":{"name":"IT-Sicherheitsmanagement nach der neuen ISO 27001","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131358813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Kersten, Gerhard Klett, J. Reuter, Klaus-Werner Schröder
{"title":"Die Controls im Anhang A","authors":"H. Kersten, Gerhard Klett, J. Reuter, Klaus-Werner Schröder","doi":"10.1007/978-3-658-14694-8_6","DOIUrl":"https://doi.org/10.1007/978-3-658-14694-8_6","url":null,"abstract":"","PeriodicalId":290614,"journal":{"name":"IT-Sicherheitsmanagement nach der neuen ISO 27001","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121577006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}