Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
ISO/IEC 27002 (2005). Information Technology – Security Techniques – Code of Practice for Information Security Management. International Organization for Standardization. Available from www.iso.ch
COBIT (2005). Control Objectives for Information and Related Technology. Available from ISACA. www.isaca.org
ISO/IEC 13335 (2004). Information Technology – Security Techniques – Management of Information and Communications Technology Security – Part 1: Concepts and Models for Information and Communications Technology Security Management. International Organization for Standardization. Available from www.iso.ch
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
von Solms, S., von Solms, R. (2009). IT Risk Management. In: Information Security Governance. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-79984-1_8
Download citation
DOI: https://doi.org/10.1007/978-0-387-79984-1_8
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-79983-4
Online ISBN: 978-0-387-79984-1
eBook Packages: Computer ScienceComputer Science (R0)