Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
ISO and the South African Bureau of Standards accept no liability for any damage whatsoever that may result from the use of this material or the information contained therein, irrespective of the cause and quantum thereof.)
References
ISO/IEC 27002 (2005). Information Technology–Security Techniques–Code of Practice for Information Security Management. International Organization for Standardization. Available from www.iso.ch
Von Solms, SH (2005) Information Security Governance: COBIT or ISO 17799 or Both? Computers & Security, 24(2), 99–104
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
von Solms, S., von Solms, R. (2009). The Use of Best Practice Standards and Guidelines in Information Security Governance. In: Information Security Governance. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-79984-1_5
Download citation
DOI: https://doi.org/10.1007/978-0-387-79984-1_5
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-79983-4
Online ISBN: 978-0-387-79984-1
eBook Packages: Computer ScienceComputer Science (R0)