{domain:"www.qualitydigest.com",server:"169.47.211.87"} Skip to main content

User account menu
Main navigation
  • Topics
    • Customer Care
    • FDA Compliance
    • Healthcare
    • Innovation
    • Lean
    • Management
    • Metrology
    • Operations
    • Risk Management
    • Six Sigma
    • Standards
    • Statistics
    • Supply Chain
    • Sustainability
    • Training
  • Videos/Webinars
    • All videos
    • Product Demos
    • Webinars
  • Advertise
    • Advertise
    • Submit B2B Press Release
    • Write for us
  • Metrology Hub
  • Training
  • Subscribe
  • Log in
Mobile Menu
  • Home
  • Topics
    • 3D Metrology-CMSC
    • Customer Care
    • FDA Compliance
    • Healthcare
    • Innovation
    • Lean
    • Management
    • Metrology
    • Operations
    • Risk Management
    • Six Sigma
    • Standards
    • Statistics
    • Supply Chain
    • Sustainability
    • Training
  • Login / Subscribe
  • More...
    • All Features
    • All News
    • All Videos
    • Contact
    • Training

IT Security Standards Now on CD-ROM

Quality Digest
Mon, 10/16/2006 - 22:00
  • Comment
  • RSS

Social Sharing block

  • Print
Body

The principal IEC and ISO standards for information technology security were recently released as a collection on a CD–ROM.

The IT Security Standards Collection provides the most important IT security standards, from evaluating and implementing to maintaining and managing information security.

This collection of ISO/IEC standards contains the full text and illustrations of the most important ISO/IEC standards in IT security, providing a complete practical reference.

“There is no doubt that the protection of our information in systems and over networks is a critical business issue that needs immediate and ongoing attention, says Ted Humphreys, convenor of a working group within ISO/IEC JTC 1/SC 27. “Information has become one of the critical commodities in today’s fast moving e-biz world.”

The CD-ROM is expected to guide technical authorities and management at all levels to determine what the issues are, how they can assess the levels of risk they face and what they can do to manage the risks to minimize any potential damage or loss to their business information and system resources.

 …

Want to continue?
Log in or create a FREE account.
Enter your username or email address
Enter the password that accompanies your username.
By logging in you agree to receive communication from Quality Digest. Privacy Policy.
Create a FREE account
Forgot My Password

Add new comment

Image CAPTCHA
Enter the characters shown in the image.
Please login to comment.
      

© 2025 Quality Digest. Copyright on content held by Quality Digest or by individual authors. Contact Quality Digest for reprint information.
“Quality Digest" is a trademark owned by Quality Circle Institute Inc.

footer
  • Home
  • Print QD: 1995-2008
  • Print QD: 2008-2009
  • Videos
  • Privacy Policy
  • Write for us
footer second menu
  • Subscribe to Quality Digest
  • About Us
  • Contact Us