Introduction -- Security, assurance and the division of labor -- Approach and framework -- Main building blocks -- ESARIS Security Taxonomy -- ICT production and protecting it in practice -- Usage of the ICT Security Standards -- Rollout process.
Includes bibliographical references and index.
Electronic reproduction. Perth, W.A. Available via World Wide Web.