Environmental Engineering Reference
In-Depth Information
ISO/IEC 17799. (2005).
Information technology - Security
techniques - Code of practice for information security
management
. ISO/IEC.
Johnson, G. (2002). Comparison of IEC and IEEE stan-
dards for computer-based control systems important to
safety. In Proceedings of CNRA/CSNI Workshop on
Licensing and Operating Experience of Computer-Based
I&C Systems. AEN/NEA.
ISO/IEC 27000. (2009).
Information technology - Security
techniques - Information security management systems
- Overview and vocabulary
. ISO/IEC.
Johnson, B., & Christensen, L. (2008).
Educational re-
search: Quantitative, qualitative, and mixed approaches
.
Thousand Oaks, CA: Sage Publications. doi:10.1093/
swr/32.1.3
ISO/IEC 27001. (2005).
Information technology - Security
techniques - Information security management systems
- Requirements.
ISO/IEC.
Jonson, G. (2010). The INSAG Defense in Depth Concept
and D-in-D&D in I&C. Paper presented at the meeting
of the
7th ANS Topical Meeting on NPIC-HMIT, Las
Vegas, USA.
ISO/IEC 27002. (2005).
Information technology - Security
techniques - Code of practice for information security
management.
ISO/IEC.
ISO/IEC 27003. (2010).
Information technology - Security
techniques - Information security management system
implementation guidance.
ISO/IEC.
Kaijser, A. (1984).
The Swedish Infrastructure - His-
torical Development and Future Challenges
. Stockholm:
Carlsson.
ISO/IEC 27004. (2009).
Information technology - Security
techniques - Information security management - Mea-
surement.
ISO/IEC.
Karry, R., et al. (2010, October). Trustworthy hardware:
Identifying and classifying hardware trojans.
Computer
Magazine
, 39-46. Christiansen, B. (2006).
Active FPGA
security through decoy circuits
. (MS Thesis). Air Force
Institute of Technology.
ISO/IEC 27005. (2011).
Information technology - Secu-
rity techniques - Information security risk management.
ISO/IEC.
Kersken, M. (2001). Qualification of pre-developed soft-
ware for safety-critical I&C application in NPP's. Paper
presented at CNRA/CSNI Workshop on Licensing and
Operating Experience of Computer-Based I&C Systems,
Hluboka-nad-Vltavou, Czech Republic.
ISO/IEC 27006. (2011).
Information technology - Security
techniques - Requirements for bodies providing audit
and certification of information security management
systems.
ISO/IEC.
Kharchenko, V. (1999). Multi-version Systems: Models,
Reliability, Design Technologies.
The 10th ESREL Con-
ference: Vol.1, pp. 73-77.
Munich, Germany.
ISO/IEC 27007. (2011).
Information technology - Se-
curity techniques - Guidelines for information security
management systems auditing.
ISO/IEC.
Kharchenko, V. S. (Ed.). (2012). CASE-assessment of
critical software systems. Quality. Reliability. Safety.
Kharkiv, Ukraine: National Aerospace University KhAI.
ISO/IEC 27008. (2011).
Information technology - Secu-
rity techniques - Guidelines for auditors on information
security management systems controls.
ISO/IEC.
Kharchenko, V. S., & Vilkomir, S. A. (2000). The Formal-
ized Models of Software Verification Assessment. Paper
presented at 5th International Conference Probabilistic
Safety Assessment and Management, Osaka, Japan.
ISO/IEC TR 9126 (2000). Information technology. Soft-
ware product quality - Part 2: External metrics; Part 3:
Internal metrics; Part 4: Quality in use metrics. Interna-
tional Organization for Standardization.
ISO/IEC. (2008).
Systems and software engineering -
Software life cycle processes
. ISO/IEC.
Search WWH ::
Custom Search