|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
JSTOR_ocn876049154 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
140408s2013 xxu ob 000 0 eng d |
040 |
|
|
|a JSTOR
|b eng
|e rda
|e pn
|c JSTOR
|d SFB
|d OCLCO
|d COO
|d E7B
|d YDXCP
|d N$T
|d OCLCO
|d EBLCP
|d DEBSZ
|d N$T
|d OCLCO
|d AGLDB
|d MERUC
|d IOG
|d OCLCA
|d OCLCF
|d OCLCQ
|d OCLCO
|d LVT
|d STF
|d UKAHL
|d OCLCQ
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 900741923
|
020 |
|
|
|a 9781849285315
|q (electronic bk.)
|
020 |
|
|
|a 1849285314
|q (electronic bk.)
|
020 |
|
|
|z 9781849285308
|
020 |
|
|
|z 1849285306
|
029 |
1 |
|
|a AU@
|b 000056897895
|
029 |
1 |
|
|a DEBSZ
|b 44953085X
|
029 |
1 |
|
|a DEBSZ
|b 456353089
|
035 |
|
|
|a (OCoLC)876049154
|z (OCoLC)900741923
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Calder, Alan,
|d 1957-
|
245 |
1 |
4 |
|a The case for ISO27001 :
|b 2013 /
|c Alan Calder.
|
250 |
|
|
|a Second edition.
|
264 |
|
1 |
|a United Kingdom :
|b IT Governance Publishing,
|c 2013.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from PDF title page (JSTOR, viewed March 21, 2014).
|
504 |
|
|
|a Includes bibliographical references.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
650 |
|
0 |
|a Business enterprises
|x Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security
|x Management
|x Standards.
|
650 |
|
0 |
|a Data protection
|x Management
|x Standards.
|
650 |
|
0 |
|a Confidential business information.
|
650 |
|
0 |
|a Cyberterrorism.
|
650 |
|
6 |
|a Sécurité informatique
|x Gestion
|x Normes.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|v Gestion
|v Normes.
|
650 |
|
6 |
|a Renseignements commerciaux confidentiels.
|
650 |
|
6 |
|a Cyberterrorisme.
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Business enterprises
|x Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00842535
|
650 |
|
7 |
|a Confidential business information.
|2 fast
|0 (OCoLC)fst00874699
|
650 |
|
7 |
|a Cyberterrorism.
|2 fast
|0 (OCoLC)fst00885802
|
776 |
0 |
8 |
|i Print version:
|a Calder, Alan, 1957-
|t Case for ISO27001 : 2013.
|b Second edition
|z 9781849285315
|w (OCoLC)864095751
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh52r
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26135096
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL3015816
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10904541
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 838720
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11821794
|
994 |
|
|
|a 92
|b IZTAP
|