Information Security and Prototype Protection According to ISA 6&TISAX®

Understand and Implement Requirements Successfully

USD 239.99 (Print)

incl. taxes, plus possibly shipping costs

available for pre-order
€219.99 (Print)

incl. taxes, plus possibly shipping costs

available for pre-order
Description
Information Security and Prototype Protection According to ISA 6&TISAX®
What Matters When Implementing ISA 6 and TISAX®!

This hands-on guide explains what is essential for implementing ISA 6 and TISAX®, walks you through the requirements step by step, and provides concrete support in meeting them. Numerous examples and practical implementation tips make it easier to transfer the concepts into practice.

TISAX® and the associated ISA 6 catalog have become well-established in recent years and are now widely used across industries by companies collaborating with the automotive sector. As a result, a valid TISAX® label is increasingly becoming a prerequisite for securing contracts in this industry.

- Clear explanations of ISA 6 and TISAX®
- Step-by-step guidance through ISA 6 and TISAX® requirements
- Implementing an information security management system
- Optimal preparation for certification
- Numerous examples and practical implementation tips
- Includes prototype protection
Information Security and Prototype Protection According to ISA 6&TISAX®
What Matters When Implementing ISA 6 and TISAX®!

This hands-on guide explains what is essential for implementing ISA 6 and TISAX®, walks you through the requirements step by step, and provides concrete support in meeting them. Numerous examples and practical implementation tips make it easier to transfer the concepts into practice.

TISAX® and the associated ISA 6 catalog have become well-established in recent years and are now widely used across industries by companies collaborating with the automotive sector. As a result, a valid TISAX® label is increasingly becoming a prerequisite for securing contracts in this industry.

- Clear explanations of ISA 6 and TISAX®
- Step-by-step guidance through ISA 6 and TISAX® requirements
- Implementing an information security management system
- Optimal preparation for certification
- Numerous examples and practical implementation tips
- Includes prototype protection
Customer evaluation for "Information Security and Prototype Protection According to ISA 6&TISAX®"
Write an evaluation
Evaluations will be activated after verification.

The fields marked with * are required.

Author Info

Christopher Eller is the founder of isms-connect.com. With his company, he pursues the goal of making information security and compliance accessible to small and medium-sized companies.
Bennet Vogel works as a freelance consultant, auditor and trainer for management systems in Berlin. With over 16 years of experience as a management consultant and entrepreneur, he advises companies from all sectors on the introduction of management systems.

Christopher Eller is the founder of isms-connect.com. With his company, he pursues the goal of making information security and compliance accessible to small and medium-sized companies.
Bennet Vogel works as a freelance consultant, auditor and trainer for management systems in Berlin. With over 16 years of experience as a management consultant and entrepreneur, he advises companies from all sectors on the introduction of management systems.

Cover Downloads

You may use the cover files free of charge to promote the book.

Print Cover

You may use the cover files free of charge to promote the book.

Print Cover

Safety Instructions<

Carl Hanser Verlag GmbH & Co KG
Vilshofener Str. 10
81679 München
E-Mail: info@hanser.de

Safety instructions according to Art. 9 para. 7 sentence 2 GPSR are not required.

Carl Hanser Verlag GmbH & Co KG
Vilshofener Str. 10
81679 München
E-Mail: info@hanser.de

Safety instructions according to Art. 9 para. 7 sentence 2 GPSR are not required.

Customers also viewed
Customers also viewed