|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
JSTOR_ocn860626136 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
131012s2013 xx ob 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d DEBSZ
|d B24X7
|d STF
|d JSTOR
|d COO
|d OCLCF
|d OCLCQ
|d OCLCO
|d YDXCP
|d OCLCQ
|d N$T
|d CSJ
|d OCLCQ
|d ICA
|d AGLDB
|d MERUC
|d OCLCQ
|d IOG
|d VTS
|d AU@
|d OCLCQ
|d WYU
|d LVT
|d OCLCQ
|d BRF
|d EYM
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 900745281
|a 1058115933
|a 1060194780
|a 1179543433
|a 1194723768
|
020 |
|
|
|a 9781849285278
|q (electronic bk.)
|
020 |
|
|
|a 1849285276
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000053305530
|
029 |
1 |
|
|a CHNEW
|b 001052322
|
029 |
1 |
|
|a CHVBK
|b 567711420
|
029 |
1 |
|
|a DEBBG
|b BV043960476
|
029 |
1 |
|
|a DEBSZ
|b 397646518
|
029 |
1 |
|
|a DEBSZ
|b 481276165
|
029 |
1 |
|
|a AU@
|b 000067075189
|
029 |
1 |
|
|a AU@
|b 000067098074
|
029 |
1 |
|
|a AU@
|b 000069984059
|
035 |
|
|
|a (OCoLC)860626136
|z (OCoLC)900745281
|z (OCoLC)1058115933
|z (OCoLC)1060194780
|z (OCoLC)1179543433
|z (OCoLC)1194723768
|
037 |
|
|
|a 22573/ctt4k59bp
|b JSTOR
|
050 |
|
4 |
|a QA76.9.A25 .W845 2013
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Watkins, Steve.
|
245 |
1 |
3 |
|a An Introduction to Information Security and ISO27001 :
|b 2013.
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Ely :
|b IT Governance Publishing,
|c 2013.
|
300 |
|
|
|a 1 online resource (52 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a About the Author; contents; Introduction; Chapter 1: Information Security -- What's That?; Who does it matter to?; Chapter 2: It's Not IT; Chapter 3: ISO27001 and the Management System Requirements; Chapter 4: Legal, Regulatory and Contractual Requirements and Business Risk; Chapter 5: Information Security Controls; Information security organisation, structure and human resources; Assets, classification and access control; Physical access and environmental issues; Networks and IT; When things go wrong; Compliance and audit; Chapter 6: Certification; Other audit applications.
|
505 |
8 |
|
|a Chapter 7: SignpostingTerms; ITG Resources.
|
520 |
|
|
|a Up to date with the latest version of the Standard (ISO27001:2013), An Introduction to information security and ISO27001:2013 is the perfect solution for anyone wanting an accurate, fast, easy-to-read primer on information security from an acknowledged expert on ISO27001.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Data protection
|x Standards.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|v Normes.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|x Normes.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Data protection
|x Standards
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Watkins, Steve.
|t An Introduction to Information Security and ISO27001 : 2013.
|d Ely : IT Governance Publishing, ©2013
|z 9781849285261
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh3wf
|z Texto completo
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00058239
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1463578
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 838719
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11230918
|
994 |
|
|
|a 92
|b IZTAP
|