|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
JSTOR_on1011348648 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
171113t20172017enk ob 000 0 eng d |
040 |
|
|
|a JSTOR
|b eng
|e rda
|e pn
|c JSTOR
|d OCLCF
|d OCLCA
|d UMI
|d STF
|d TOH
|d UAB
|d OCLCQ
|d CEF
|d OCLCQ
|d DEBBG
|d G3B
|d YDXIT
|d VLB
|d VT2
|d OCLCO
|d OCLCQ
|d CZL
|d OCLCO
|d LUU
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1033544463
|
020 |
|
|
|a 9781849289504
|q (electronic book)
|
020 |
|
|
|a 1849289506
|q (electronic book)
|
020 |
|
|
|a 9781849289511
|q (electronic book)
|
020 |
|
|
|a 1849289514
|q (electronic book)
|
020 |
|
|
|z 1849289492
|
020 |
|
|
|z 9781849289498
|
029 |
1 |
|
|a AU@
|b 000062543187
|
035 |
|
|
|a (OCoLC)1011348648
|z (OCoLC)1033544463
|
037 |
|
|
|a 22573/ctt1wpdwf2
|b JSTOR
|
050 |
|
4 |
|a HF5548.37
|b .C35 2017
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Calder, Alan,
|d 1957-
|e author.
|
245 |
1 |
0 |
|a Nine steps to success :
|b an ISO 27001:2013 implementation overview /
|c Alan Calder.
|
246 |
3 |
|
|a 9 steps to success
|
250 |
|
|
|a North American edition.
|
264 |
|
1 |
|a Ely, Cambridgeshire, United Kingdom :
|b IT Governance Publishing,
|c 2017.
|
264 |
|
4 |
|c ©2017
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references.
|
588 |
0 |
|
|a Online resource; title from digital title page (viewed on June 20, 2019).
|
520 |
|
|
|a Step-by-step guidance on a successful ISO 27001 implementation from an industry leader Resilience to cyber attacks requires an organization to defend itself across all of its attack surface: people, processes, and technology. ISO 27001 is the international standard that sets out the requirements of an information security management system (ISMS) - a holistic approach to information security that encompasses people, processes, and technology. Accredited certification to the Standard is recognized worldwide as the hallmark of best-practice information security management. Achieving and maintaining accredited certification to ISO 27001 can be complicated, especially for those who are new to the Standard. Author of Nine Steps to Success - An ISO 27001 Implementation Overview, Alan Calder is the founder and executive chairman of IT Governance. He led the world's first implementation of a management system certified to BS 7799, the forerunner to ISO 27001, and has been working with the Standard ever since. Hundreds of organizations around the world have achieved accredited certification to ISO 27001 with IT Governance's guidance, which is distilled in this book. Successfully implement ISO 27001 with this must-have guide Aligned with the latest iteration of ISO 27001:2013, the North American edition of Nine Steps to Success - An ISO 27001 Implementation Overview is ideal for anyone tackling ISO 27001 for the first time. In nine critical steps, the guide covers each element of the ISO 27001 project in simple, non-technical language. There is a special focus on how US organizations can tackle this governance. This book offers guidance throughout implementation: Getting management support and keeping the board's attention. Creating a management framework and performing a gap analysis so that you can clearly understand the controls you already have in place, and identify where you need to focus. Structuring and resourcing your project, including advice on whether to use a consultant or do it yourself, and examining the tools and resources that will make your job easier. Conducting a five-step risk assessment, and creating a Statement of Applicability (SoA) and risk treatment plan (RTP). Guidance on integrating your ISO 27001 ISMS with an ISO 9001 quality management system (QMS) and other management systems. Addressing the documentation challenges you'll face as you create business policies, procedures, work instructions, and records - includin...
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
650 |
|
0 |
|a Computer security
|x Management.
|
650 |
|
0 |
|a Computer security
|x Standards.
|
650 |
|
0 |
|a Data protection
|x Standards.
|
650 |
|
6 |
|a Sécurité informatique
|x Gestion.
|
650 |
|
6 |
|a Sécurité informatique
|x Normes.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|v Normes.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|x Normes.
|
650 |
|
7 |
|a Computer security
|x Management
|2 fast
|
650 |
|
7 |
|a Computer security
|x Standards
|2 fast
|
650 |
|
7 |
|a Data protection
|x Standards
|2 fast
|
710 |
2 |
|
|a IT Governance Publishing,
|e publisher.
|
776 |
0 |
8 |
|i Print version:
|a IT GOVERNANCE PUBLISHING.
|t NINE STEPS TO SUCCESS.
|d [Place of publication not identified] : IT GOVERNANCE LTD, 2017
|z 1849289492
|w (OCoLC)1007058371
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt1wn0skw
|z Texto completo
|
994 |
|
|
|a 92
|b IZTAP
|