|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
JSTOR_ocn891398390 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
140903t20142014enk o 000 0 eng d |
040 |
|
|
|a E7B
|b eng
|e rda
|e pn
|c E7B
|d OCLCO
|d STF
|d B24X7
|d COO
|d JSTOR
|d OCLCF
|d BTCTA
|d OCLCQ
|d LIV
|d IOG
|d OCLCA
|d LVT
|d UKAHL
|d N$T
|d VLY
|d BRF
|d UX1
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1143219516
|a 1175644863
|
020 |
|
|
|a 9781849286893
|q (electronic bk.)
|
020 |
|
|
|a 1849286892
|q (electronic bk.)
|
020 |
|
|
|a 9781849286916
|q (electronic bk.)
|
020 |
|
|
|a 1849286914
|q (electronic bk.)
|
020 |
|
|
|z 9781849286886
|
020 |
|
|
|z 1849286884
|
029 |
1 |
|
|a AU@
|b 000056932972
|
029 |
1 |
|
|a CHNEW
|b 000696798
|
029 |
1 |
|
|a CHNEW
|b 000696799
|
035 |
|
|
|a (OCoLC)891398390
|z (OCoLC)1143219516
|z (OCoLC)1175644863
|
037 |
|
|
|a 22573/ctt155kmh9
|b JSTOR
|
050 |
|
4 |
|a QA76.9.A25
|b .C353 2014eb
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Calder, Alan,
|e author.
|
245 |
1 |
0 |
|a Cyber essentials :
|b a pocket guide /
|c Alan Calder.
|
264 |
|
1 |
|a Cambridgeshire, England :
|b IT Governance Publishing,
|c 2014.
|
264 |
|
4 |
|c ©2014
|
300 |
|
|
|a 1 online resource (59 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
0 |
|
|a Compliance Series
|
588 |
0 |
|
|a Online resource; title from PDF title page (ebrary, viewed September 3, 2014).
|
520 |
|
|
|a "Cyber Essentials certification will provide numerous benefits, including the opportunity to tender for business where certification to the scheme may be a prerequisite, reducing insurance premiums, and helping to improve investor and customer confidence. This pocket guide explains how to achieve certification to Cyber Essentials in a fast, effective and cost-effective manner."--
|c Unedited summary from book
|
505 |
0 |
|
|a Cover; Title; Copyright; Contents; Introduction ; The origins of the Cyber Essentials scheme ; Why get certified? ; What am I protecting? ; Beyond and outside Cyber Essentials ; Structure of the book ; Part I: Requirements for basic technical protection from cyber attacks ; Types of attack ; The scope ; The five cyber security measures and implementing controls ; Documentation ; Part II: Assurance framework ; Scope ; Getting certified -- are you ready? ; Getting certified to Cyber Essentials ; Getting certified to Cyber Essentials Plus ; After the assessment ; Part III: Further assistance
|
505 |
8 |
|
|a Practical help and consultancy Useful documents and further information ; The next step -- cyber security standards ; Staff training ; Cyber resilience ; ITG resources ; Do it yourself -- solution ; Get a little help -- solution ; Get a lot of help -- solution
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
776 |
0 |
8 |
|i Print version:
|a Calder, Alan.
|t Cyber essentials : a pocket guide.
|d Cambridgeshire, England : IT Governance Publishing, ©2014
|h 59 pages
|k Compliance Series
|z 9781849286886
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt15hvwpg
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH28654972
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00073961
|
938 |
|
|
|a Baker and Taylor
|b BTCP
|n BK0017871519
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10921132
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 838715
|
994 |
|
|
|a 92
|b IZTAP
|