|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
JSTOR_ocn860626135 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
131012s2013 xx ob 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d DEBSZ
|d E7B
|d UMI
|d YDXCP
|d OCLCQ
|d B24X7
|d JSTOR
|d COO
|d OCLCO
|d DEBBG
|d OCLCQ
|d OCLCF
|d CUS
|d N$T
|d OCLCQ
|d AGLDB
|d MERUC
|d OCLCQ
|d IOG
|d OCLCA
|d CEF
|d AU@
|d OCLCQ
|d WYU
|d LVT
|d STF
|d ESU
|d UKAHL
|d VT2
|d OCLCQ
|d UX1
|d BRF
|d EYM
|d LUN
|d TOH
|d OCLCO
|d TAC
|d INARC
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 868083997
|a 1058256093
|a 1060198563
|a 1175621159
|a 1179690094
|a 1194727524
|a 1233043904
|a 1235776659
|a 1266736391
|a 1302698982
|
020 |
|
|
|a 9781849285117
|q (electronic bk.)
|
020 |
|
|
|a 184928511X
|q (electronic bk.)
|
020 |
|
|
|z 1849285101
|
020 |
|
|
|z 9781849285100
|
020 |
|
|
|z 9781905356102
|
024 |
8 |
|
|a 9781849285117
|
029 |
1 |
|
|a AU@
|b 000053305532
|
029 |
1 |
|
|a CHNEW
|b 000635662
|
029 |
1 |
|
|a CHNEW
|b 001052320
|
029 |
1 |
|
|a DEBBG
|b BV041633158
|
029 |
1 |
|
|a DEBBG
|b BV041778221
|
029 |
1 |
|
|a DEBSZ
|b 39764650X
|
029 |
1 |
|
|a DEBSZ
|b 404327044
|
029 |
1 |
|
|a DEBSZ
|b 456353216
|
029 |
1 |
|
|a AU@
|b 000067074292
|
029 |
1 |
|
|a AU@
|b 000067092650
|
035 |
|
|
|a (OCoLC)860626135
|z (OCoLC)868083997
|z (OCoLC)1058256093
|z (OCoLC)1060198563
|z (OCoLC)1175621159
|z (OCoLC)1179690094
|z (OCoLC)1194727524
|z (OCoLC)1233043904
|z (OCoLC)1235776659
|z (OCoLC)1266736391
|z (OCoLC)1302698982
|
037 |
|
|
|a CL0500000356
|b Safari Books Online
|
037 |
|
|
|a 22573/ctt4k5fjc
|b JSTOR
|
050 |
|
4 |
|a QA76.9.A25 .C384 2013
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Calder, Alan,
|d 1957-
|e author.
|
245 |
1 |
0 |
|a Nine steps to success :
|b an ISO27001:2013 implementation overview /
|c Alan Calder.
|
250 |
|
|
|a Second edition.
|
260 |
|
|
|a Ely, United Kingdom :
|b IT Governance Publishing,
|c 2013.
|
300 |
|
|
|a 1 online resource (98 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
505 |
0 |
|
|a About the Author; Introduction; Chapter 1: Initial Approach; Information risk and regulatory risk; The 'fear list'; ISO27001/ISO27002; Skills, knowledge and competence; Links to other standards; Chapter 2: Management Support; Strategic alignment; Prioritisation and endorsement; Change management; The CEO's role; The CEO's commitment; Senior management support; Chapter 3: Scoping; Endpoint security; Defining boundaries; Phased approach; Network mapping; Cutting corners; Chapter 4: Planning; Structured approach to implementation; Plan; Do; Check; Act.
|
505 |
8 |
|
|a Integration with existing security management systemsGap analysis; Quality system integration; Project management; Project team chair; Project plan; Costs and project monitoring; Consultants; Information security manager; Specialist information security advice; Functional specialists; Chapter 5: Communication; Staff buy-in; Information security policy; Chapter 6: Risk Assessment; Introduction to risk management; Baseline control set; Risk assessment; Who conducts the risk assessment?; Risk analysis; Risk workshop; Impacts; Controls; Risk assessment tools; Chapter 7: Control Selection.
|
505 |
8 |
|
|a Nature of controlsControl selection criteria; Statement of applicability; Chapter 8: Documentation; Four levels of documentation; Documentation approaches; Trial and error; External expertise; Third party documentation toolkit plus guidance; Chapter 9: Testing; Chapter 10: Successful Certification; ITG Resources.
|
520 |
|
|
|a Completely up to date with ISO27001:2013, this is the new edition of the original no-nonsense guide to successful ISO27001 certification. Ideal for anyone tackling ISO27001 for the first time, Nine Steps to Success outlines the nine essential steps to an effective ISMS implementation. Nine critical steps that mean the difference between project success and abject failure.
|
504 |
|
|
|a Includes bibliographical references.
|
588 |
0 |
|
|a Print version record.
|
542 |
|
|
|f Copyright © IT Governance Publishing
|g 2013
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Business enterprises
|x Computer networks
|x Security measures.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Business enterprises
|x Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Calder, Alan, 1957-
|t Nine steps to success.
|b Second edition.
|d Ely, Cambridgeshire IT Governance Publishing, 2013
|z 9781849285100
|w (OCoLC)867602489
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh40b
|z Texto completo
|
938 |
|
|
|a Internet Archive
|b INAR
|n ninestepstosucce0000cald
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26135133
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH30883414
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00058241
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1463576
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10778510
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 838717
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11230916
|
994 |
|
|
|a 92
|b IZTAP
|