Cargando…

Iso/iec 27001 An Introduction to Information Security and the ISMS Standard.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Watkins, Steve
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ely : IT Governance Ltd, 2022.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 JSTOR_on1351196678
003 OCoLC
005 20231005004200.0
006 m o d
007 cr |||||||||||
008 221126s2022 xx o ||| 0 eng d
040 |a EBLCP  |b eng  |c EBLCP  |d JSTOR  |d EBLCP  |d OCLCF  |d OCLCQ  |d OCLCO 
019 |a 1371284804 
020 |a 9781787784048  |q (electronic bk.) 
020 |a 1787784045  |q (electronic bk.) 
029 1 |a AU@  |b 000073179930 
035 |a (OCoLC)1351196678  |z (OCoLC)1371284804 
037 |a 22573/ctv30qfxt7  |b JSTOR 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |2 23/eng/20221202 
049 |a UAMI 
100 1 |a Watkins, Steve. 
245 1 0 |a Iso/iec 27001  |h [electronic resource] :  |b An Introduction to Information Security and the ISMS Standard. 
260 |a Ely :  |b IT Governance Ltd,  |c 2022. 
300 |a 1 online resource (48 p.) 
500 |a Description based upon print version of record. 
505 0 |a Cover -- Title -- Copyright -- About the Author -- Contents -- Introduction -- Chapter 1: Information security -- What's that? -- Aspect one -- Aspect two -- Aspect three -- Who does it matter to? -- Chapter 2: It's not IT -- Chapter 3: ISO 27001 and the management system requirements -- Chapter 4: Legal, regulatory and contractual requirements and business risk -- Chapter 5: Information security controls -- 1. Organizational controls -- 2. People controls -- 3. Physical controls -- 4. Technological controls -- Chapter 6: Certification -- Other audit applications -- Chapter 7: Signposting 
505 8 |a Terms -- Further reading 
500 |a Written by an acknowledged expert on the ISO 27001 Standard, ISO 27001:2022 - An Introduction to information security and the ISMS standard is an ideal primer for anyone implementing an ISMS aligned to ISO 27001:2022. The guide is a must-have resource giving a clear, concise and easy-to-read introduction to information security. 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
590 |a JSTOR  |b Books at JSTOR All Purchased 
650 0 |a Computer networks  |x Security measures  |x Standards. 
650 0 |a Data protection  |x Standards. 
650 0 |a Information technology  |x Standards. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |x Normes. 
650 6 |a Protection de l'information (Informatique)  |x Normes. 
650 6 |a Technologie de l'information  |x Normes. 
650 7 |a Computer networks  |x Security measures  |x Standards  |2 fast 
650 7 |a Data protection  |x Standards  |2 fast 
650 7 |a Information technology  |x Standards  |2 fast 
776 0 8 |i Print version:  |a Watkins, Steve  |t Iso/iec 27001:2022  |d Ely : IT Governance Ltd,c2022  |z 9781787784031 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctv30qq13d  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL30202680 
994 |a 92  |b IZTAP