|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
JSTOR_on1100956359 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d | |
007 |
cr ||||||||||| |
008 |
190408s2018 enk go 000 0 eng d |
040 |
|
|
|a UKAHL
|b eng
|e rda
|e pn
|c UKAHL
|d OCLCQ
|d YDX
|d JSTOR
|d OCLCF
|d EBLCP
|d UKAHL
|d OCLCQ
|d OCL
|d MM9
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1090482084
|
020 |
|
|
|a 9781787781030
|q (e-book)
|
020 |
|
|
|a 1787781038
|
020 |
|
|
|z 9781787781023
|
020 |
|
|
|z 178778102X
|
029 |
1 |
|
|a AU@
|b 000065193232
|
035 |
|
|
|a (OCoLC)1100956359
|z (OCoLC)1090482084
|
037 |
|
|
|a 22573/ctv62hmqg
|b JSTOR
|
043 |
|
|
|a e------
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Calder, Alan,
|e author.
|
245 |
1 |
2 |
|a A concise introduction to the NIS Directive :
|b a pocket guide for digital service providers /
|c Alan Calder.
|
264 |
|
1 |
|a Ely :
|b ITGP,
|c 2018.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Cover; Title; Copyright; About the Author; Contents; Introduction; Background; Guidance; Key definitions; Chapter 1: Scope and applicability; Online marketplaces; Chapter 2: Authorities and bodies; Competent authorities; CSIRTs; Single points of contact; Cooperation Group; Powers and penalties; Chapter 3: Complying with the Directive; Minimum security measures; Appropriate to the risk; Technical and organisational measures; Mandatory incident notification; International standards; Chapter 4: Implementing cyber resilience; ISO 27001 and ISO 27002; Standards for Cloud services; ISO 22301
|
505 |
8 |
|
|a ISO 27035Combining standards; Appendix: Mapping of ENISA's Technical Guidelines and ISO 27001 Annex A; Further reading
|
520 |
|
|
|a This pocket guide is an introduction to the EU's NIS Directive (Directive on security of network and information systems). It outlines the key requirements, details which digital service providers are within scope, and explains how the security objectives from ENISA's Technical Guidelines and international standards can help DSPs achieve compliance.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
650 |
|
0 |
|a Computer security
|z European Union countries.
|
650 |
|
0 |
|a Computer security
|x Law and legislation
|z European Union countries.
|
650 |
|
6 |
|a Sécurité informatique
|z Pays de l'Union européenne.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Computer security
|x Law and legislation
|2 fast
|
651 |
|
7 |
|a European Union countries
|2 fast
|
776 |
0 |
8 |
|i Print version:
|z 178778102X
|z 9781787781023
|w (OCoLC)1076439277
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctv62hhc9
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH36161437
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH36159032
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5796948
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16124228
|
994 |
|
|
|a 92
|b IZTAP
|