|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
JSTOR_ocn994038794 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
170718s2017 xx o 000 0 ita d |
040 |
|
|
|a YDX
|b eng
|e pn
|c YDX
|d JSTOR
|d OCLCF
|d OCLCA
|d EBLCP
|d OCLCQ
|d OCLCO
|d OCLCQ
|d UX1
|d OCLCO
|d N$T
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 994509314
|a 1175624676
|
020 |
|
|
|a 9781849289252
|q (electronic bk.)
|
020 |
|
|
|a 1849289255
|q (electronic bk.)
|
020 |
|
|
|a 1849289247
|
020 |
|
|
|a 9781849289245
|
024 |
3 |
|
|a 9781849289245
|
029 |
1 |
|
|a AU@
|b 000065649304
|
029 |
1 |
|
|a AU@
|b 000070031637
|
035 |
|
|
|a (OCoLC)994038794
|z (OCoLC)994509314
|z (OCoLC)1175624676
|
037 |
|
|
|a 22573/ctt1nc4t0d
|b JSTOR
|
050 |
|
4 |
|a HF5548.37
|b .C35 2017eb
|
072 |
|
7 |
|a COM000000
|2 bisacsh
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a CALDER, ALAN.
|
245 |
1 |
2 |
|a I nove passi per il successo :
|b compendio per l 'attuazione della norma ISO 27001:2013 /
|c Alan Calder.
|
260 |
|
|
|a [Place of publication not identified] :
|b IT GOVERNANCE LTD,
|c 2017.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Rivelando la metodologia impiegata da consulenti che hanno attuato con successo centinaia di SGSI, questo libro ti assisterà durante le varie fasi che compongono il tuo progetto ISO 27001.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
650 |
|
0 |
|a Computer security
|x Management.
|
650 |
|
0 |
|a Computer security
|x Standards.
|
650 |
|
0 |
|a Data protection
|x Standards.
|
650 |
|
6 |
|a Sécurité informatique
|x Gestion.
|
650 |
|
6 |
|a Sécurité informatique
|x Normes.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|v Normes.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|x Normes.
|
650 |
|
7 |
|a COMPUTERS
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|x Management
|2 fast
|
650 |
|
7 |
|a Computer security
|x Standards
|2 fast
|
650 |
|
7 |
|a Data protection
|x Standards
|2 fast
|
776 |
0 |
8 |
|i Print version:
|z 1849289247
|z 9781849289245
|w (OCoLC)987891216
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt1pwt90q
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5255162
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14697851
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1593793
|
994 |
|
|
|a 92
|b IZTAP
|