This paper explains the legal requirements for cyber security that operators of critical infrastructures in Germany need to comply with. It describes the cyclic process of an information security management system and compares it against corresponding ser
Soubory
Název souboru | ||
998-2095-11-22-17AR0_EN.pdf
|
|