|
|
|
|
LEADER |
02896nmm a2200361 u 4500 |
001 |
EB001925820 |
003 |
EBX01000000000000001088722 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
050 |
|
4 |
|a HF5548.37
|
100 |
1 |
|
|a Chopra, Abhishek
|
245 |
0 |
0 |
|a Implementing an information security management system
|b security management based on ISO 27001 guidelines
|c Abhishek Chopra, Mukund Chaudhary
|
260 |
|
|
|a [California], New York, NY
|b Apress, Distributed to the Book trade worldwide by Springer Science+Business Media New York
|c 2020
|
300 |
|
|
|a 1 volume
|b illustrations
|
505 |
0 |
|
|a Chapter 1 -- Need for information security -- Chapter 2 -- Step 1: Assessing Needs and Scope -- Chapter 3 -- Step 2: Project kick-off -- Chapter 4 -- Step 3: Initial Risk Assessment -- Chapter 5 -- Step 4: Risk Management Approach -- Chapter 6 -- Step 5: Execution -- Chapter 7 -- Step 6: Audit -- Chapter 8 -- Step 7: Management Review -- Chapter 9 -- Step 8: External Audit / Assessment -- Chapter 10 -- Continual Improvement
|
505 |
0 |
|
|a Includes bibliographical references
|
653 |
|
|
|a Computer security / Management
|
653 |
|
|
|a Data protection / Standards
|
653 |
|
|
|a Sécurité informatique / Normes
|
653 |
|
|
|a Sécurité informatique / Gestion
|
653 |
|
|
|a Computer security / Standards / http://id.loc.gov/authorities/subjects/sh99004226
|
653 |
|
|
|a Protection de l'information (Informatique) / Normes
|
653 |
|
|
|a Computer security / Standards / fast
|
653 |
|
|
|a Computer security / Management / fast
|
653 |
|
|
|a Data protection / Standards / fast
|
700 |
1 |
|
|a Chaudhary, Mukund
|e author
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781484254134/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 658
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You'll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation, post-implementation, and during monitoring of the implemented controls. Implementing an Information Security Management System provides implementation guidelines for ISO 27001:2013 to protect your information assets and ensure a safer enterprise environment. This book is a step-by-step guide on implementing secure ISMS for your organization. It will change the way you interpret and implement information security in your work area or organization. You will: Discover information safeguard methods Implement end-to-end information security Manage risk associated with information security Prepare for audit with associated roles and responsibilities Identify your information risk Protect your information assets
|