|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
JSTOR_ocn976407926 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
170317s2017 enk ob 000 0 ger d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d YDX
|d JSTOR
|d EBLCP
|d OCLCF
|d C6I
|d OCLCQ
|d VT2
|d UX1
|d OCLCO
|d FAU
|d N$T
|d KSU
|d HTM
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 994127879
|a 994577404
|a 1175640922
|
020 |
|
|
|a 1849288682
|
020 |
|
|
|a 9781849288675
|
020 |
|
|
|a 1849288674
|
020 |
|
|
|a 9781849288682
|q (electronic bk.)
|
020 |
|
|
|z 9781849288699
|
029 |
1 |
|
|a AU@
|b 000065977638
|
029 |
1 |
|
|a CHNEW
|b 000987001
|
029 |
1 |
|
|a CHVBK
|b 509399185
|
035 |
|
|
|a (OCoLC)976407926
|z (OCoLC)994127879
|z (OCoLC)994577404
|z (OCoLC)1175640922
|
037 |
|
|
|a CL0500000840
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM000000
|2 bisacsh
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Calder, Alan,
|d 1957-
|e author.
|
245 |
1 |
0 |
|a Neun Schritte zum Erfolg :
|b Ein Überblick zur Implementierung der Norm ISO 27001:2013 /
|c Alan Calder.
|
264 |
|
1 |
|a Ely, Cambridgeshire, United Kingdom :
|b IT Governance Publishing,
|c 2017.
|
300 |
|
|
|a 1 online resource (148 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references.
|
588 |
0 |
|
|a Online resource; title from title page (viewed March 16, 2017).
|
520 |
|
|
|a This book provides you with the guidance you need to understand the requirements of the standard and ensure your implementation project is a success. Six insider tips for success are given.
|
505 |
0 |
|
|a Über Den Autor (Pp. 5-5); Table Of Contents (Pp. 6-8); Einführung (Pp. 9-20); Kapitel 1: Projektmandat (Pp. 21-37); Kapitel 2: Projektinitiierung (Pp. 38-59); Kapitel 3: Isms-Initiierung (Pp. 60-68); Kapitel 4: Management-Framework (Pp. 69-86); Kapitel 5: Grundlegende Sicherheitskriterien (Pp. 87-89); Kapitel 6: Risikomanagement (Pp. 90-107); Kapitel 7: Implementierung (Pp. 108-114); Kapitel 8: Maßnahme, Überwachung Und Überprüfung (Pp. 115-120); Kapitel 9: Zertifizierung (Pp. 121-125); Iso 27001 Ressourcen (Pp. 126-145); Itg Ressourcen (Pp. 146-148)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
650 |
|
0 |
|a Data protection
|x Standards.
|
650 |
|
0 |
|a Data protection
|x Evaluation.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|v Normes.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|x Évaluation.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|x Normes.
|
650 |
|
7 |
|a COMPUTERS
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Data protection
|x Standards
|2 fast
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt1pwt8v5
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5255164
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14697842
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1593792
|
994 |
|
|
|a 92
|b IZTAP
|