Contents & References of Providing a model for establishing information security project management (based on PMBOK standard)
List:
Abstract .. 1
Introduction .. 3
Research history .. 4
Chapter one: Problem design. 20
The second chapter: Project management. 36
Chapter three: IT project management. 67
Chapter Four: work method 79
Chapter Five: A comprehensive review of the quality, security and risk of the information security project. 91
Sixth chapter: Implementation of the proposed algorithm (case study) and conclusions. 111
Seventh chapter: . 117
Chapter Eight: sources. 158
Source:
Engineering of computer network security policies, authored by Dr. Nasser Mediri and engineer Farhad Taghizadeh Milani, Mehrgan Qalam Publications, 1390.
Inactive Pad-Defend Engineering of Computer Networks, authored by Dr. Nasser Madiuri, Engineer Munirsadat Shah Velayati, Mehrgan Qalam Publications, 1390 edition,
The best in information security, George El Estefank, translated and written by Dr. Alireza Pourabrahimi, Dr. Abbas Toloui Ashlaghi, Islamic Azad University Publications, Electronic Department, first edition summer 1389,
Information Technology, Security Techniques - Ritual The work of information security management / Iran standard - ISO - IEC 27002 / Iran Institute of Standards and Industrial Research / 1st edition 1386
Familiarity with ISMS and security standards ISO 27001 and ISO 27002 / written by Haider Ali Kurangi / December 1386 / the book is allowed to be used in scientific network seminars /
Quality and Productivity Management, Dr. Parviz Fattahi, University Press Payam Noor, second edition, Azar 1388, Shabak 5-585-387-964-978
Management and control of information technology projects, Jack T. Marchuka, translated by engineer Ramin Molanapour, engineer Farzad Habibipour Rudsari, second edition of March 1388,
a comprehensive approach to the theory, application and design of management information systems (MIS), authored by Dr. Mehdi Beheshtian and engineer Hossein Abolhasani, Pardis Publications 57, second edition of 1379, pp. 446 and 447,
project management guide, authored by Anjuman PMI project management, translator: Translators Seyed Hossein Usoli, Najabat, Ali Bayati, Hossein Naseri, Ali Afkhami, Tehran: National Petrochemical Industries Company, 1384 285 p.: Table.
Strategic planning of information and communication technology, Ali Ahmadi, 1383 knowledge publication
Article presenting a model for managing information technology projects based on PMBOK, Ahmadzadeh Qasimabadi
Introduction to the country's information technology strategies, autumn 2013
Information technology security guide, Secretariat of the Supreme Informatics Council, July 2014
Group Ariana project management industrial research, organizer of project management conference in Iran
Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement / by W.Krag Brotby, CISM / CRC Press, Taylor & Francis Group, an informa business, 2009
IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data / by Lance Hayden, Ph.D. / Mc Graw Hill, 2010
Risk Analysis and Security Countermeasure Selection / by Thomas L. Norman, cpp/psp/csc / CRC Press, Taylor & Francis Group, an informa business, 2010 / ISBN 978-1-4200-7870-1
Security Strategy: From Requirements to Reality / by Bill Stackpole and Eric Oksendahl / CRC Press. Taylor & Francis Group, an informa business, 2011
Management Information Systems: James A.O' Brien, George M.Markas / Ninth edition / Mc Grow Hill / 2009
http://www.smartKPIs.com / Top 25 Information Technology KPIs of 2010
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission./ Frederick T. Sheldon, Robert K. Abercrombie, Ali Mili /
ISO/IEC 27001 & 27002 implementation guidance and metrics / Prepared by the international community of ISO 27k implementers at ISO27001security.com/ Version 1 28th June 2007
Metrics for IT Services Managing / by Peter Brooks / Van Haren Publishing / 2006
Social Engineering and The ISO/IEC 17799:2005 Security Standard: A Study on Effectiveness / by: Evangelos D. FrangopoulosFrangopoulos / March 2007 / University of South Africa, School of computing
Using Cobit, ITIL and Other Frameworks to Achieve your IT Governance Requirements / by: Brain Broadhurst / www. Foxit.net
ITIL V3 and Information Security / by : Jim Clinch / White Paper , May 2009
http://www.27000.ir
http://www.paydarymelli.ir
http://gilascomputer.com
Meryl K. Evans -Writing an RFP (Request for Proposal), http://EzineArticles.com/
Bruce Morris- How to Write a Request for Proposal for a Web Project - http://brucemorris.com
Meryl K. Evans -Writing an RFP (Request for Proposal), http://EzineArticles.com/
Bruce Morris- How to Write a Request for Proposal for a Web Project - http://brucemorris.com
http://www.olcsoft.com/select.htm
Tom Randal & Lynn DeNoia - Principles of Effective IT Management, Clinical Professor, Rensselaer Polytechnic Institute (Hartford, CT campus)
Karen Tate & Judy Calvert (2002) Creating Successful Projects Large IT Project Management in an Integrated Justice Environment, Presented by, Griffin Tate Group, Inc.
Jeffrey L.