Fr. 245.00

Information Security and Prototype Protection According to ISA 6 & TISAX® - Understand and Implement Requirements Successfully

English · Hardback

Shipping usually within 1 to 2 weeks

Description

Read more

What Matters When Implementing ISA 6 and TISAX®!This hands-on guide explains what is essential for implementing ISA 6 and TISAX®, walks you through the requirements step by step, and provides concrete support in meeting them. Numerous examples and practical implementation tips make it easier to transfer the concepts into practice.TISAX® and the associated ISA 6 catalog have become well-established in recent years and are now widely used across industries by companies collaborating with the automotive sector. As a result, a valid TISAX® label is increasingly becoming a prerequisite for securing contracts in this industry.- Clear explanations of ISA 6 and TISAX®- Step-by-step guidance through ISA 6 and TISAX® requirements- Implementing an information security management system- Optimal preparation for certification- Numerous examples and practical implementation tips- Includes prototype protection

About the author










Christopher Eller is the founder of isms-connect.com. With his company, he pursues the goal of making information security and compliance accessible to small and medium-sized companies.
Bennet Vogel works as a freelance consultant, auditor and trainer for management systems in Berlin. With over 16 years of experience as a management consultant and entrepreneur, he advises companies from all sectors on the introduction of management systems.

Product details

Authors Christopher Eller, Bennet Vogel
Publisher Hanser Fachbuchverlag
 
Languages English
Product format Hardback
Released 17.11.2025
 
EAN 9781569904961
ISBN 978-1-56990-496-1
No. of pages 180
Dimensions 170 mm x 13 mm x 240 mm
Weight 420 g
Illustrations Komplett in Farbe
Subjects Social sciences, law, business > Business > Management

Datenschutz, Fahrzeug- und Transportindustrie, Management allgemein, Digitalization of business processes, Industry model TISAX, Securing technical infrastructure, Information security level, Security of IT systems, IT Security Act

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.