11![INCITS Withdrawn Standards List INCITS/ISO/IEC 27005:[removed]Information technology - Security techniques - Information security risk management Committee: INCITS/ CS1 INCITS/ISO/IEC[removed]:[removed]Part 2: Proto INCITS Withdrawn Standards List INCITS/ISO/IEC 27005:[removed]Information technology - Security techniques - Information security risk management Committee: INCITS/ CS1 INCITS/ISO/IEC[removed]:[removed]Part 2: Proto](https://www.pdfsearch.io/img/88ae0a2f580477194852347d634f69d1.jpg) | Add to Reading ListSource URL: www.incits.orgLanguage: English - Date: 2014-09-25 15:02:41
|
---|
12![SecSDM: A Usable Tool to Support IT Undergraduate Students in Secure Software Development SecSDM: A Usable Tool to Support IT Undergraduate Students in Secure Software Development](https://www.pdfsearch.io/img/e2b9e16f4d6768866f5f5925240d3b37.jpg) | Add to Reading ListSource URL: www.ifip11-12.orgLanguage: English - Date: 2012-09-26 06:34:18
|
---|
13![ISO/IEC 27036 – Information Security for Supplier Relationships © 2012 Utilities Telecom Council ISO/IEC 27036 – Information Security for Supplier Relationships © 2012 Utilities Telecom Council](https://www.pdfsearch.io/img/0f2b381aa6796a2e1191526f956d0843.jpg) | Add to Reading ListSource URL: buildsecurityin.us-cert.govLanguage: English - Date: 2013-06-18 12:39:18
|
---|
14![RFI Comments - Open Group Security Forum RFI Comments - Open Group Security Forum](https://www.pdfsearch.io/img/57694ce1f08d2a24b21ecabba2d3866e.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2013-04-08 16:03:39
|
---|
15![ALDERNEY GAMBLING CONTROL COMMISSION Standards and Guidelines for eGambling Cloud Version[removed]th November ALDERNEY GAMBLING CONTROL COMMISSION Standards and Guidelines for eGambling Cloud Version[removed]th November](https://www.pdfsearch.io/img/993d6e2aa2f94ca8fc297c1eee8b25c8.jpg) | Add to Reading ListSource URL: www.gamblingcontrol.orgLanguage: English - Date: 2013-11-06 08:00:02
|
---|
16![| TISRIM - Tudor Information Security Risk Management tool Context The implementation of an Information Security Management System (ISMS) is a long, complicated and expensive process, particularly when it is with an ISO/ | TISRIM - Tudor Information Security Risk Management tool Context The implementation of an Information Security Management System (ISMS) is a long, complicated and expensive process, particularly when it is with an ISO/](https://www.pdfsearch.io/img/17ba2eff94a56eb9e503f4f4b94ce359.jpg) | Add to Reading ListSource URL: www.tudor.luLanguage: English - Date: 2013-10-28 05:30:47
|
---|
17![ISO/IEC[removed]ISO/IEC 27000 ISO/IEC[removed]ISO/IEC 27000](https://www.pdfsearch.io/img/46fbd1e45aecd33d855b0f9d3bbb0dba.jpg) | Add to Reading ListSource URL: www.isms.jipdec.jpLanguage: English |
---|
18![](https://www.pdfsearch.io/img/8a9dad12505cbc0ee0fd7b75056ec31c.jpg) | Add to Reading ListSource URL: www.isms.jipdec.jpLanguage: English |
---|
19![Developing talent Catalogue of ISO’s technical assistance and training programmes Developing talent Catalogue of ISO’s technical assistance and training programmes](https://www.pdfsearch.io/img/6ec85f18c6476117506ef15548444a1f.jpg) | Add to Reading ListSource URL: www.iso.orgLanguage: English - Date: 2012-08-17 04:06:41
|
---|
20![](https://www.pdfsearch.io/img/078e08c93b3bb5d5e9163449a549f116.jpg) | Add to Reading ListSource URL: www.isms.jipdec.jpLanguage: English |
---|