|
|
|
|
LEADER |
00000cam a22000007a 4500 |
001 |
JSTOR_on1119731371 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
190918s2019 xx eo 000 0 eng d |
040 |
|
|
|a BER
|b eng
|e pn
|c BER
|d JSTOR
|d EBLCP
|d OCLCQ
|d MM9
|d YDX
|d OCLCQ
|d OCLCO
|d FAU
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1120137356
|a 1120695110
|
020 |
|
|
|a 9781787781450
|q (electronic bk.)
|
020 |
|
|
|a 1787781453
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000066133097
|
029 |
1 |
|
|a AU@
|b 000068486775
|
029 |
1 |
|
|a CHNEW
|b 001069876
|
029 |
1 |
|
|a CHVBK
|b 577491180
|
035 |
|
|
|a (OCoLC)1119731371
|z (OCoLC)1120137356
|z (OCoLC)1120695110
|
037 |
|
|
|a 22573/ctvj4w1z0
|b JSTOR
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Kenyon, Bridget,
|e author.
|
245 |
1 |
0 |
|a ISO 27001 controls - A guide to implementing and auditing /
|c Bridget Kenyon.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|b IT Governance Publishing,
|c 2019.
|
300 |
|
|
|a 1 online resource (237 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Ideal for information security managers, auditors, consultants and organisations preparing for ISO 27001 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001.
|
505 |
0 |
|
|a Cover; Title; Copyright; Foreword; About The Author; Acknowledgements; Disclaimer; Contents; Chapter 1: General; 1.1 Scope of this guide; 1.2 Field of application; Chapter 2: Implementing and auditing ISMS control objectives and controls; 2.1 Information security policies (ISO/IEC 27001, A.5); 2.2 Organization of information security (ISO/IEC 27001, A.6); 2.3 Human resource security (ISO/IEC 27001, A.7); 2.4 Asset management (ISO/IEC 27001, A.8); 2.5 Access control (ISO/IEC 27001, A.9); 2.6 Cryptography (ISO/IEC 27001, A.10); 2.7 Physical and environmental security (ISO/IEC 27001, A.11)
|
505 |
8 |
|
|a 2.8 Operations security (ISO/IEC 27001, A.12)2.9 Communications security (ISO/IEC 27001, A.13); 2.10 System acquisition, development and maintenance (ISO/IEC 27001, A.14); 2.11 Supplier relationships (ISO/IEC 27001, A.15); 2.12 Information security incident management (ISO/IEC 27001, A.16); 2.13 Information security aspects of business continuity management (ISO/IEC 27001, A.17); 2.14 Compliance (ISO/IEC 27001, A.18); Further reading
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
650 |
|
0 |
|a Business enterprises
|x Computer networks
|x Security measures
|x Auditing.
|
650 |
|
0 |
|a Computer security
|x Management
|x Standards.
|
650 |
|
0 |
|a Data protection
|x Management
|x Standards.
|
650 |
|
0 |
|a Confidential business information.
|
650 |
|
0 |
|a Risk management
|x Evaluation.
|
650 |
|
0 |
|a Risk assessment.
|
650 |
|
2 |
|a Risk Assessment
|
650 |
|
6 |
|a Sécurité informatique
|x Gestion
|x Normes.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|v Gestion
|v Normes.
|
650 |
|
6 |
|a Renseignements commerciaux confidentiels.
|
650 |
|
6 |
|a Gestion du risque
|x Évaluation.
|
650 |
|
6 |
|a Évaluation du risque.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|x Gestion
|x Normes.
|
650 |
|
7 |
|a risk assessment.
|2 aat
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Industrial Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Management Science.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Organizational Behavior.
|2 bisacsh
|
650 |
|
7 |
|a Confidential business information
|2 fast
|
650 |
|
7 |
|a Risk assessment
|2 fast
|
650 |
|
7 |
|a Risk management
|x Evaluation
|2 fast
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
776 |
0 |
8 |
|i Print version:
|a Kenyon, Bridget.
|t ISO 27001 Controls - A Guide to Implementing and Auditing.
|d Ely : IT Governance Ltd, ©2019
|z 9781787781443
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctvj4sxjm
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5897691
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 300831055
|
994 |
|
|
|a 92
|b IZTAP
|