Information security compliance assessment using information security maturity model /
Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014
Main Authors: | , , |
---|---|
Format: | |
Language: | eng |
Published: |
2014
|
Subjects: |
_version_ | 1826461567001034752 |
---|---|
author | Hassan Hossein Zadeh, 1976- author Siti Hajar Othman Fakulti Komputeran |
author_facet | Hassan Hossein Zadeh, 1976- author Siti Hajar Othman Fakulti Komputeran |
author_sort | Hassan Hossein Zadeh, 1976- author |
collection | OCEAN |
description | Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014 |
first_indexed | 2024-03-05T14:37:55Z |
format | |
id | KOHA-OAI-TEST:522394 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T14:37:55Z |
publishDate | 2014 |
record_format | dspace |
spelling | KOHA-OAI-TEST:5223942020-12-19T17:19:38ZInformation security compliance assessment using information security maturity model / Hassan Hossein Zadeh, 1976- author Siti Hajar Othman Fakulti Komputeran 2014engThesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014Includes bibliographical referencesPRZSL Electronic information resources |
spellingShingle | Electronic information resources Hassan Hossein Zadeh, 1976- author Siti Hajar Othman Fakulti Komputeran Information security compliance assessment using information security maturity model / |
title | Information security compliance assessment using information security maturity model / |
title_full | Information security compliance assessment using information security maturity model / |
title_fullStr | Information security compliance assessment using information security maturity model / |
title_full_unstemmed | Information security compliance assessment using information security maturity model / |
title_short | Information security compliance assessment using information security maturity model / |
title_sort | information security compliance assessment using information security maturity model |
topic | Electronic information resources |
work_keys_str_mv | AT hassanhosseinzadeh1976author informationsecuritycomplianceassessmentusinginformationsecuritymaturitymodel AT sitihajarothman informationsecuritycomplianceassessmentusinginformationsecuritymaturitymodel AT fakultikomputeran informationsecuritycomplianceassessmentusinginformationsecuritymaturitymodel |