MARC 닫기
03543cam a22005771i 4500
000000533160
20210114161818
m d
cr cnu---unuuu
190607s2020 enk ob 001 0 eng d
▼a GBB9D6769
▼2 bnb
▼a 019497580
▼2 Uk
▼a 9780749496968
▼q electronic book
▼a 0749496967
▼q electronic book
▼z 9781789660302
▼q hardcover
▼z 9780749496951
▼q paperback
▼a 2258715
▼b (N$T)
▼a (OCoLC)1122169287
▼a KoganPage11027
▼b Ingram Content Group
▼a UKMGB
▼b eng
▼e rda
▼e pn
▼c UKMGB
▼d OCLCO
▼d OCLCF
▼d EBLCP
▼d N$T
▼d UKAHL
▼d YDXIT
▼d 248023
▼a QA76.9.A25
▼b C35 2020
▼a 005.8
▼2 23
▼a 658.0558
▼2 23
▼a Calder, Alan,
▼d 1957-,
▼e author.
▼a IT governance:
▼b an international guide to data security and ISO27001/ISO 27002 /:
▼c Alan Calder, Steve Watkins.
▼a Seventh edition.
▼a London ;
▼a New York, NY:
▼b Kogan Page,
▼c 2020.
▼a 1 online resource (x, 395 pages).
▼a text
▼b txt
▼2 rdacontent
▼a computer
▼b c
▼2 rdamedia
▼a online resource
▼b cr
▼2 rdacarrier
▼a Includes bibliographical references and index.
▼a Chapter 01: Why is information security necessary -- Chapter 02: The UK combined code, the FRC risk guidance and Sarbanes-Oxley -- Chapter 03: ISO27001 -- Chapter 04: Organizing information security -- Chapter 05: Information security policy and scope -- Chapter 06: The risk assessment and Statement of Applicability -- Chapter 07: Mobile devices -- Chapter 08: Human resources security -- Chapter 09: Asset management -- Chapter 10: Media handling -- Chapter 11: Access control -- Chapter 12: User access management -- Chapter 13: System and application access control -- Chapter 14: Cryptography -- Chapter 15: Physical and environmental security -- Chapter 16: Equipment security -- Chapter 17: Operations security -- Chapter 18: Controls against malicious software (malware) -- Chapter 19: Communications management -- Chapter 20: Exchanges of information -- Chapter 21: System acquisition, development and maintenance -- Chapter 22: Development and support processes -- Chapter 23: Supplier relationships -- Chapter 24: Monitoring and information security incident management -- Chapter 25: Business and information security continuity management -- Chapter 26: Compliance -- Chapter 27: The ISO27001 audit.
▼a Implement an effective and compliant information security management system using IT governance best practice.
▼a Description based on online resource; title from digital title page (viewed on February 10, 2020).
▼a Master record variable field(s) change: 050, 082, 650
▼a Data protection.
▼a Computer security.
▼a Business enterprises
▼x Computer networks
▼x Security measures.
▼a Business enterprises
▼x Computer networks
▼x Security measures.
▼2 fast
▼0 (OCoLC)fst00842535
▼a Data protection.
▼2 fast
▼0 (OCoLC)fst00887958
▼a Electronic books.
▼a Watkins, Steve,
▼d 1970-,
▼e author.
▼i Print version:,
▼z 9781789660302
▼3 EBSCOhost
▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2258715
▼a Askews and Holts Library Services
▼b ASKH
▼n AH36195277
▼a ProQuest Ebook Central
▼b EBLB
▼n EBL5940349
▼a EBSCOhost
▼b EBSC
▼n 2258715
▼a 강리원
▼a eBook
▼a 92
▼b N$T
| 자료유형 : | eBook |
|---|---|
| ISBN : | 9780749496968 |
| ISBN : | 0749496967 |
| ISBN : | |
| ISBN : | |
| 개인저자 : | Calder, Alan, 1957-, author. |
| 서명/저자사항 : | IT governance: an international guide to data security and ISO27001/ISO 27002 /: Alan Calder, Steve Watkins. |
| 판사항 : | Seventh edition. |
| 발행사항 : | London ; New York, NY: Kogan Page, 2020. |
| 형태사항 : | 1 online resource (x, 395 pages). |
| 서지주기 : | Includes bibliographical references and index. |
| 내용주기 : | Chapter 01: Why is information security necessary -- Chapter 02: The UK combined code, the FRC risk guidance and Sarbanes-Oxley -- Chapter 03: ISO27001 -- Chapter 04: Organizing information security -- Chapter 05: Information security policy and scope -- Chapter 06: The risk assessment and Statement of Applicability -- Chapter 07: Mobile devices -- Chapter 08: Human resources security -- Chapter 09: Asset management -- Chapter 10: Media handling -- Chapter 11: Access control -- Chapter 12: User access management -- Chapter 13: System and application access control -- Chapter 14: Cryptography -- Chapter 15: Physical and environmental security -- Chapter 16: Equipment security -- Chapter 17: Operations security -- Chapter 18: Controls against malicious software (malware) -- Chapter 19: Communications management -- Chapter 20: Exchanges of information -- Chapter 21: System acquisition, development and maintenance -- Chapter 22: Development and support processes -- Chapter 23: Supplier relationships -- Chapter 24: Monitoring and information security incident management -- Chapter 25: Business and information security continuity management -- Chapter 26: Compliance -- Chapter 27: The ISO27001 audit. |
| 요약 : | Implement an effective and compliant information security management system using IT governance best practice. |
| 일반주제명 : | Data protection. -- |
| 일반주제명 : | Computer security. -- |
| 일반주제명 : | Business enterprises -- Computer networks -- Security measures. -- |
| 일반주제명 : | Business enterprises -- Computer networks -- Security measures. -- |
| 일반주제명 : | Data protection. -- |
| 개인저자 : | Watkins, Steve, 1970-, author. |
| 기타형태 저록 : | Print version:, 9781789660302 |
| 언어 | 영어 |
| URL : |
|---|
서평쓰기