2Rudd C.An introductory overview of ITIL[S/OL].[2004-04].http://www.itsmf.com/bestpractice/publications.asp.
3BSI,BS 7799-1:Information security management-part 1:code of Practice for information security management,BSI[S/OL].http://asia.bsi-global.com/China +InformationSecurity/Overview/WhatisBS7799.xalter.
4BSI,BS7799-2:Information security management-part 2:Specification for information security management systems,BSI[S/OL].http://asia.bsi-global.com/China+InformationSecurity/Overview/WhatisBS7799.xaher.
5NIST.NIST SP800-12 An introduction to computer seeuritv:the NIST handbook[S/OL].[1996-21].http://csrc.nist.gov/publications/nistpubs//800-12/handbook.pdf.
6Swanson M,Hash J,Bowen P/NIST SP800-18 Guide for Developing Security Plans for Federal Information Systems[S/OL].[2006-04].http://csrc.nist.gov/publications/nistpubs/800-18-Revl/sp800-18-Rev1-final.pdf.
7Swanson M,Wohl A,Pope L.et al.NIST SP800-34.Contingency planning guide for information technology systems[S/OL].[2002-06].http://csrc.nist.gov/publieations/nistpubs/800-34/sp800-34.pdf.
9Paul Overbeek.ITIL SECURITY MANAGEMENT Security as a managed service[EB/OE].[2004-06].http://www.spiral.lu/SI/Event.nsf/0/c0eba09d9cb8a870c1256eba002b6f49/$FILE/08_Overbeek_Sec-Man_Lux_Jun04.pdf.