|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
JSTOR_ocn609854788 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr n||---||||| |
008 |
100427s2007 xx ob 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d STF
|d IDEBK
|d OCLCQ
|d N$T
|d E7B
|d B24X7
|d OCLCQ
|d UMI
|d DEBSZ
|d JSTOR
|d NLGGC
|d OCLCQ
|d JSTOR
|d YDXCP
|d COO
|d OCLCQ
|d AGLDB
|d LIV
|d OCLCQ
|d MERUC
|d OCLCQ
|d IOG
|d OCLCF
|d EZ9
|d VNS
|d VTS
|d CEF
|d OCLCQ
|d WYU
|d LVT
|d UAB
|d M8D
|d UKAHL
|d VT2
|d OCLCQ
|d MM9
|d UX1
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 741346897
|a 765143526
|a 816348250
|a 857301849
|a 1103264061
|a 1129350503
|a 1153052154
|a 1175626744
|a 1192334902
|a 1240518080
|
020 |
|
|
|a 9781905356294
|q (electronic bk.)
|
020 |
|
|
|a 1905356293
|q (electronic bk.)
|
020 |
|
|
|z 1282384686
|
020 |
|
|
|z 9781282384682
|
020 |
|
|
|z 1905356269
|
020 |
|
|
|z 9781905356263
|
029 |
1 |
|
|a AU@
|b 000051409108
|
029 |
1 |
|
|a AU@
|b 000052006408
|
029 |
1 |
|
|a AU@
|b 000069991450
|
029 |
1 |
|
|a DEBBG
|b BV041431788
|
029 |
1 |
|
|a DEBBG
|b BV043031508
|
029 |
1 |
|
|a DEBSZ
|b 396333346
|
029 |
1 |
|
|a DEBSZ
|b 398276552
|
029 |
1 |
|
|a DEBSZ
|b 421529024
|
035 |
|
|
|a (OCoLC)609854788
|z (OCoLC)741346897
|z (OCoLC)765143526
|z (OCoLC)816348250
|z (OCoLC)857301849
|z (OCoLC)1103264061
|z (OCoLC)1129350503
|z (OCoLC)1153052154
|z (OCoLC)1175626744
|z (OCoLC)1192334902
|z (OCoLC)1240518080
|
037 |
|
|
|a CL0500000268
|b Safari Books Online
|
037 |
|
|
|a 22573/ctt4k5n9p
|b JSTOR
|
050 |
|
4 |
|a HF5548.37
|b .C351 2007eb
|
072 |
|
7 |
|a BUS
|x 104000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 071000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 103000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 097000
|2 bisacsh
|
072 |
|
7 |
|a K
|2 bicssc
|
072 |
|
7 |
|a BUS033070
|2 bisacsh
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 658.472
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Calder, Alan.
|
245 |
1 |
0 |
|a Risk Assessment for Asset Owners :
|b a Pocket Guide.
|
260 |
|
|
|a Ely :
|b IT Governance Pub.,
|c 2007.
|
300 |
|
|
|a 1 online resource (46 pages).
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Pocket Guides: Practical Information Security
|
505 |
0 |
|
|a Cover; Half title page; Other books in the series; Title page; Contents; 1: INTRODUCTION; 2: INFORMATION SECURITYRISK MANAGEMENT; 3: DEFINITIONS; 4: ASSET OWNERS; 5: OVERVIEW OF THE RISKASSESSMENT PROCESS; 6: ASSET IDENTIFICATION; 7: THREATS ANDVULNERABILITIES; 8: ASSET VALUATION; 9: RISK LEVEL; 10: RISK TREATMENT ANDCONTROL SELECTION; 11: STATEMENT OFAPPLICABILITY AND RISK TREATMENTPLAN; 12: REVIEWING THE RISKASSESSMENT.
|
520 |
|
|
|a This book is apocket guide to the ISO27001 risk assessment, and designed to assist asset owners and others who are working within an ISO27001/ISO17799 framework to deliver a qualitative risk assessment. It conforms with the guidance provided in BS7799-3:2006 and NIST SP 800-30.
|
504 |
|
|
|a Includes bibliographical references.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
650 |
|
0 |
|a Data protection
|x Evaluation.
|
650 |
|
0 |
|a Data protection
|x Standards.
|
650 |
|
0 |
|a Risk management.
|
650 |
|
2 |
|a Risk Management
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|x Évaluation.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|v Normes.
|
650 |
|
6 |
|a Gestion du risque.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|x Normes.
|
650 |
|
7 |
|a risk management.
|2 aat
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Corporate Governance.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Leadership.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Organizational Development.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Workplace Culture.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Insurance
|x Risk Assessment & Management.
|2 bisacsh
|
650 |
|
7 |
|a Data protection
|x Standards
|2 fast
|
650 |
|
7 |
|a Risk management
|2 fast
|
700 |
1 |
|
|a Watkins, Steve.
|
776 |
0 |
8 |
|i Print version:
|z 9781905356263
|
830 |
|
0 |
|a Pocket Guides: Practical Information Security.
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh5xt
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26066005
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00034448
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 391154
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3235694
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL480371
|
994 |
|
|
|a 92
|b IZTAP
|