Environmental Engineering Reference
In-Depth Information
ISO/IEC 17799. (2005). Information technology - Security
techniques - Code of practice for information security
management . ISO/IEC.
Johnson, G. (2002). Comparison of IEC and IEEE stan-
dards for computer-based control systems important to
safety. In Proceedings of CNRA/CSNI Workshop on
Licensing and Operating Experience of Computer-Based
I&C Systems. AEN/NEA.
ISO/IEC 27000. (2009). Information technology - Security
techniques - Information security management systems
- Overview and vocabulary . ISO/IEC.
Johnson, B., & Christensen, L. (2008). Educational re-
search: Quantitative, qualitative, and mixed approaches .
Thousand Oaks, CA: Sage Publications. doi:10.1093/
swr/32.1.3
ISO/IEC 27001. (2005). Information technology - Security
techniques - Information security management systems
- Requirements. ISO/IEC.
Jonson, G. (2010). The INSAG Defense in Depth Concept
and D-in-D&D in I&C. Paper presented at the meeting
of the 7th ANS Topical Meeting on NPIC-HMIT, Las
Vegas, USA.
ISO/IEC 27002. (2005). Information technology - Security
techniques - Code of practice for information security
management. ISO/IEC.
ISO/IEC 27003. (2010). Information technology - Security
techniques - Information security management system
implementation guidance. ISO/IEC.
Kaijser, A. (1984). The Swedish Infrastructure - His-
torical Development and Future Challenges . Stockholm:
Carlsson.
ISO/IEC 27004. (2009). Information technology - Security
techniques - Information security management - Mea-
surement. ISO/IEC.
Karry, R., et al. (2010, October). Trustworthy hardware:
Identifying and classifying hardware trojans. Computer
Magazine , 39-46. Christiansen, B. (2006). Active FPGA
security through decoy circuits . (MS Thesis). Air Force
Institute of Technology.
ISO/IEC 27005. (2011). Information technology - Secu-
rity techniques - Information security risk management.
ISO/IEC.
Kersken, M. (2001). Qualification of pre-developed soft-
ware for safety-critical I&C application in NPP's. Paper
presented at CNRA/CSNI Workshop on Licensing and
Operating Experience of Computer-Based I&C Systems,
Hluboka-nad-Vltavou, Czech Republic.
ISO/IEC 27006. (2011). Information technology - Security
techniques - Requirements for bodies providing audit
and certification of information security management
systems. ISO/IEC.
Kharchenko, V. (1999). Multi-version Systems: Models,
Reliability, Design Technologies. The 10th ESREL Con-
ference: Vol.1, pp. 73-77. Munich, Germany.
ISO/IEC 27007. (2011). Information technology - Se-
curity techniques - Guidelines for information security
management systems auditing. ISO/IEC.
Kharchenko, V. S. (Ed.). (2012). CASE-assessment of
critical software systems. Quality. Reliability. Safety.
Kharkiv, Ukraine: National Aerospace University KhAI.
ISO/IEC 27008. (2011). Information technology - Secu-
rity techniques - Guidelines for auditors on information
security management systems controls. ISO/IEC.
Kharchenko, V. S., & Vilkomir, S. A. (2000). The Formal-
ized Models of Software Verification Assessment. Paper
presented at 5th International Conference Probabilistic
Safety Assessment and Management, Osaka, Japan.
ISO/IEC TR 9126 (2000). Information technology. Soft-
ware product quality - Part 2: External metrics; Part 3:
Internal metrics; Part 4: Quality in use metrics. Interna-
tional Organization for Standardization.
ISO/IEC. (2008). Systems and software engineering -
Software life cycle processes . ISO/IEC.
Search WWH ::




Custom Search