|
|
|
|
LEADER |
00000cam a2200000M 4500 |
001 |
JSTOR_on1137805976 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
190912nuuuuuuuuxx o 000 0 eng d |
040 |
|
|
|a YDX
|b eng
|e pn
|c YDX
|d OCLCQ
|d JSTOR
|d OCLCF
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1119534385
|a 1119587319
|a 1280543232
|
020 |
|
|
|a 1787781372
|q (electronic bk.)
|
020 |
|
|
|a 9781787781375
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000066120606
|
035 |
|
|
|a (OCoLC)1137805976
|z (OCoLC)1119534385
|z (OCoLC)1119587319
|z (OCoLC)1280543232
|
037 |
|
|
|a 22573/ctvnf8cpm
|b JSTOR
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 000000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
082 |
0 |
4 |
|a 658.4780218
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a ALAN CALDER - STEVE WATKINS.
|
245 |
1 |
0 |
|a Information security risk management for ISO 27001/ISO 27002
|
260 |
|
|
|a [Place of publication not identified]
|b IT GOVERNANCE PUBLISHING.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
650 |
|
0 |
|a Business enterprises
|x Computer networks
|x Security measures
|x Standards.
|
650 |
|
0 |
|a Computer security
|x Management
|x Standards.
|
650 |
|
0 |
|a Data protection
|x Management
|x Standards.
|
650 |
|
0 |
|a Information technology
|x Standards.
|
650 |
|
0 |
|a Risk management
|x Evaluation.
|
650 |
|
0 |
|a Risk assessment.
|
650 |
|
6 |
|a Sécurité informatique
|x Gestion
|x Normes.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|v Gestion
|v Normes.
|
650 |
|
6 |
|a Technologie de l'information
|x Normes.
|
650 |
|
6 |
|a Gestion du risque
|x Évaluation.
|
650 |
|
6 |
|a Évaluation du risque.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|x Gestion
|x Normes.
|
650 |
|
7 |
|a risk assessment.
|2 aat
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Information technology
|x Standards
|2 fast
|
650 |
|
7 |
|a Risk assessment
|2 fast
|
650 |
|
7 |
|a Risk management
|x Evaluation
|2 fast
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctvndv9kx
|z Texto completo
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 300814285
|
994 |
|
|
|a 92
|b IZTAP
|