|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
JSTOR_on1351196678 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
221126s2022 xx o ||| 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|c EBLCP
|d JSTOR
|d EBLCP
|d OCLCF
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1371284804
|
020 |
|
|
|a 9781787784048
|q (electronic bk.)
|
020 |
|
|
|a 1787784045
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000073179930
|
035 |
|
|
|a (OCoLC)1351196678
|z (OCoLC)1371284804
|
037 |
|
|
|a 22573/ctv30qfxt7
|b JSTOR
|
050 |
|
4 |
|a TK5105.59
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20221202
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Watkins, Steve.
|
245 |
1 |
0 |
|a Iso/iec 27001
|h [electronic resource] :
|b An Introduction to Information Security and the ISMS Standard.
|
260 |
|
|
|a Ely :
|b IT Governance Ltd,
|c 2022.
|
300 |
|
|
|a 1 online resource (48 p.)
|
500 |
|
|
|a Description based upon print version of record.
|
505 |
0 |
|
|a Cover -- Title -- Copyright -- About the Author -- Contents -- Introduction -- Chapter 1: Information security -- What's that? -- Aspect one -- Aspect two -- Aspect three -- Who does it matter to? -- Chapter 2: It's not IT -- Chapter 3: ISO 27001 and the management system requirements -- Chapter 4: Legal, regulatory and contractual requirements and business risk -- Chapter 5: Information security controls -- 1. Organizational controls -- 2. People controls -- 3. Physical controls -- 4. Technological controls -- Chapter 6: Certification -- Other audit applications -- Chapter 7: Signposting
|
505 |
8 |
|
|a Terms -- Further reading
|
500 |
|
|
|a Written by an acknowledged expert on the ISO 27001 Standard, ISO 27001:2022 - An Introduction to information security and the ISMS standard is an ideal primer for anyone implementing an ISMS aligned to ISO 27001:2022. The guide is a must-have resource giving a clear, concise and easy-to-read introduction to information security.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Standards.
|
650 |
|
0 |
|a Data protection
|x Standards.
|
650 |
|
0 |
|a Information technology
|x Standards.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|x Normes.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|x Normes.
|
650 |
|
6 |
|a Technologie de l'information
|x Normes.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|x Standards
|2 fast
|
650 |
|
7 |
|a Data protection
|x Standards
|2 fast
|
650 |
|
7 |
|a Information technology
|x Standards
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Watkins, Steve
|t Iso/iec 27001:2022
|d Ely : IT Governance Ltd,c2022
|z 9781787784031
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctv30qq13d
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL30202680
|
994 |
|
|
|a 92
|b IZTAP
|