Cargando…

ISO 27001 controls - A guide to implementing and auditing /

Ideal for information security managers, auditors, consultants and organisations preparing for ISO 27001 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Kenyon, Bridget (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico eBook
Idioma:Inglés
Publicado: IT Governance Publishing, 2019.
Edición:First edition.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a22000007a 4500
001 JSTOR_on1119731371
003 OCoLC
005 20231005004200.0
006 m o d
007 cr cnu---unuuu
008 190918s2019 xx eo 000 0 eng d
040 |a BER  |b eng  |e pn  |c BER  |d JSTOR  |d EBLCP  |d OCLCQ  |d MM9  |d YDX  |d OCLCQ  |d OCLCO  |d FAU  |d OCLCQ  |d OCLCO 
019 |a 1120137356  |a 1120695110 
020 |a 9781787781450  |q (electronic bk.) 
020 |a 1787781453  |q (electronic bk.) 
029 1 |a AU@  |b 000066133097 
029 1 |a AU@  |b 000068486775 
029 1 |a CHNEW  |b 001069876 
029 1 |a CHVBK  |b 577491180 
035 |a (OCoLC)1119731371  |z (OCoLC)1120137356  |z (OCoLC)1120695110 
037 |a 22573/ctvj4w1z0  |b JSTOR 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Kenyon, Bridget,  |e author. 
245 1 0 |a ISO 27001 controls - A guide to implementing and auditing /  |c Bridget Kenyon. 
250 |a First edition. 
264 1 |b IT Governance Publishing,  |c 2019. 
300 |a 1 online resource (237 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Ideal for information security managers, auditors, consultants and organisations preparing for ISO 27001 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001. 
505 0 |a Cover; Title; Copyright; Foreword; About The Author; Acknowledgements; Disclaimer; Contents; Chapter 1: General; 1.1 Scope of this guide; 1.2 Field of application; Chapter 2: Implementing and auditing ISMS control objectives and controls; 2.1 Information security policies (ISO/IEC 27001, A.5); 2.2 Organization of information security (ISO/IEC 27001, A.6); 2.3 Human resource security (ISO/IEC 27001, A.7); 2.4 Asset management (ISO/IEC 27001, A.8); 2.5 Access control (ISO/IEC 27001, A.9); 2.6 Cryptography (ISO/IEC 27001, A.10); 2.7 Physical and environmental security (ISO/IEC 27001, A.11) 
505 8 |a 2.8 Operations security (ISO/IEC 27001, A.12)2.9 Communications security (ISO/IEC 27001, A.13); 2.10 System acquisition, development and maintenance (ISO/IEC 27001, A.14); 2.11 Supplier relationships (ISO/IEC 27001, A.15); 2.12 Information security incident management (ISO/IEC 27001, A.16); 2.13 Information security aspects of business continuity management (ISO/IEC 27001, A.17); 2.14 Compliance (ISO/IEC 27001, A.18); Further reading 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
590 |a JSTOR  |b Books at JSTOR All Purchased 
650 0 |a Business enterprises  |x Computer networks  |x Security measures  |x Auditing. 
650 0 |a Computer security  |x Management  |x Standards. 
650 0 |a Data protection  |x Management  |x Standards. 
650 0 |a Confidential business information. 
650 0 |a Risk management  |x Evaluation. 
650 0 |a Risk assessment. 
650 2 |a Risk Assessment 
650 6 |a Sécurité informatique  |x Gestion  |x Normes. 
650 6 |a Protection de l'information (Informatique)  |v Gestion  |v Normes. 
650 6 |a Renseignements commerciaux confidentiels. 
650 6 |a Gestion du risque  |x Évaluation. 
650 6 |a Évaluation du risque. 
650 6 |a Protection de l'information (Informatique)  |x Gestion  |x Normes. 
650 7 |a risk assessment.  |2 aat 
650 7 |a BUSINESS & ECONOMICS  |x Industrial Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Management Science.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Organizational Behavior.  |2 bisacsh 
650 7 |a Confidential business information  |2 fast 
650 7 |a Risk assessment  |2 fast 
650 7 |a Risk management  |x Evaluation  |2 fast 
710 2 |a Safari, an O'Reilly Media Company. 
776 0 8 |i Print version:  |a Kenyon, Bridget.  |t ISO 27001 Controls - A Guide to Implementing and Auditing.  |d Ely : IT Governance Ltd, ©2019  |z 9781787781443 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctvj4sxjm  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5897691 
938 |a YBP Library Services  |b YANK  |n 300831055 
994 |a 92  |b IZTAP