|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
JSTOR_ocn888035953 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
140820s2014 enka ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d EBLCP
|d B24X7
|d STF
|d COO
|d DEBSZ
|d DEBBG
|d JSTOR
|d YDXCP
|d OCLCF
|d OCLCQ
|d N$T
|d OCLCQ
|d ICA
|d AGLDB
|d MERUC
|d OCLCQ
|d IOG
|d OCLCA
|d VTS
|d CEF
|d OCLCQ
|d LVT
|d AU@
|d OCLCQ
|d K6U
|d UKAHL
|d RDF
|d SNU
|d VLY
|d BRF
|d EYM
|d QGK
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 966372826
|a 1060197336
|a 1100957411
|a 1162439283
|a 1179662446
|a 1194741139
|a 1241771245
|
020 |
|
|
|a 9781849285841
|q (electronic bk.)
|
020 |
|
|
|a 1849285845
|q (electronic bk.)
|
020 |
|
|
|z 1849285837
|
020 |
|
|
|z 9781849285834
|
029 |
1 |
|
|a AU@
|b 000068861047
|
029 |
1 |
|
|a DEBBG
|b BV042182351
|
029 |
1 |
|
|a DEBSZ
|b 415542952
|
029 |
1 |
|
|a DEBSZ
|b 417230303
|
029 |
1 |
|
|a DEBSZ
|b 481284583
|
029 |
1 |
|
|a GBVCP
|b 819912875
|
035 |
|
|
|a (OCoLC)888035953
|z (OCoLC)966372826
|z (OCoLC)1060197336
|z (OCoLC)1100957411
|z (OCoLC)1162439283
|z (OCoLC)1179662446
|z (OCoLC)1194741139
|z (OCoLC)1241771245
|
037 |
|
|
|a CL0500000466
|b Safari Books Online
|
037 |
|
|
|a 22573/ctt7z4pbd
|b JSTOR
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Krausz, Michael.
|
245 |
1 |
0 |
|a Information security breaches :
|b avoidance treatment based on ISO27001 /
|c Michael Krausz.
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Ely, Cambridgeshire, UK :
|b IT Governance Press,
|c ©2014.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed August 9, 2014).
|
520 |
|
|
|a This book helps you to manage a security breach by detailing what to do as soon as you discover a breach. Be prepared, be prompt, be decisive. When your organisation's security is compromised, you cannot afford to waste time deciding how to resolve the issue. Updated to cover ISO27001:2013, this second edition gives you clear guidance on how to treat an information security breach and tells you the plans and procedures you have to put in place to minimise damage and return to business as usual. A recovery plan will help you to: recover, and resume normal operations, more quickly; preserve customer confidence by quickly resolving service disruption; secure evidence to help with any criminal investigation and improve your chances of catching those responsible. Read this guide and find out how to manage in the face of a data breach. --
|c Edited summary from book.
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a Cover; Title; Copyright; Contents; Introduction; Chapter 1: What constitutes a breach?; Chapter 2: Treatment using ISO27001; Assess the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft the report; Final decision; Follow up with tenacity; Review; How ISO27001 supports the treatment of breaches; Chapter 3: Case studies; Case study 1 -- small company; Case study 2 -- small company; Case study 3 -- medium-sized company; Case study 4 -- large company; ITG Resources
|
546 |
|
|
|a English.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Hacking.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Piratage informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Hacking
|2 fast
|
776 |
0 |
|
|z 1849285837
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt7zsxnr
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH28339360
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00069070
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL1778763
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 838731
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12023457
|
994 |
|
|
|a 92
|b IZTAP
|