語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Implementing an information security...
~
Chopra, Abhishek.
FindBook
Google Book
Amazon
博客來
Implementing an information security management system = security management based on ISO 27001 guidelines /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Implementing an information security management system/ by Abhishek Chopra, Mukund Chaudhary.
其他題名:
security management based on ISO 27001 guidelines /
作者:
Chopra, Abhishek.
其他作者:
Chaudhary, Mukund.
出版者:
Berkeley, CA :Apress : : 2020.,
面頁冊數:
xvii, 274 p. :ill., digital ;24 cm.
內容註:
Chapter 1 - Need for information security -- Chapter 2 - Step 1: Assessing Needs and Scope -- Chapter 3 - Step 2: Project kick-off -- Chapter 4 - Step 3: Initial Risk Assessment -- Chapter 5 - Step 4: Risk Management Approach -- Chapter 6 - Step 5: Execution -- Chapter 7 - Step 6: Audit -- Chapter 8 - Step 7: Management Review -- Chapter 9 - Step 8: External Audit / Assessment -- Chapter 10 - Continual Improvement.
Contained By:
Springer eBooks
標題:
Computer security - Management. -
電子資源:
https://doi.org/10.1007/978-1-4842-5413-4
ISBN:
9781484254134
Implementing an information security management system = security management based on ISO 27001 guidelines /
Chopra, Abhishek.
Implementing an information security management system
security management based on ISO 27001 guidelines /[electronic resource] :by Abhishek Chopra, Mukund Chaudhary. - Berkeley, CA :Apress :2020. - xvii, 274 p. :ill., digital ;24 cm.
Chapter 1 - Need for information security -- Chapter 2 - Step 1: Assessing Needs and Scope -- Chapter 3 - Step 2: Project kick-off -- Chapter 4 - Step 3: Initial Risk Assessment -- Chapter 5 - Step 4: Risk Management Approach -- Chapter 6 - Step 5: Execution -- Chapter 7 - Step 6: Audit -- Chapter 8 - Step 7: Management Review -- Chapter 9 - Step 8: External Audit / Assessment -- Chapter 10 - Continual Improvement.
Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You'll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation, post-implementation, and during monitoring of the implemented controls. Implementing an Information Security Management System provides implementation guidelines for ISO 27001:2013 to protect your information assets and ensure a safer enterprise environment. This book is a step-by-step guide on implementing secure ISMS for your organization. It will change the way you interpret and implement information security in your work area or organization. You will: Discover information safeguard methods Implement end-to-end information security Manage risk associated with information security Prepare for audit with associated roles and responsibilities Identify your information risk Protect your information assets.
ISBN: 9781484254134
Standard No.: 10.1007/978-1-4842-5413-4doiSubjects--Topical Terms:
590469
Computer security
--Management.
LC Class. No.: QA76.9.A25 / C467 2020
Dewey Class. No.: 005.8
Implementing an information security management system = security management based on ISO 27001 guidelines /
LDR
:02500nmm a2200325 a 4500
001
2215366
003
DE-He213
005
20200602113053.0
006
m d
007
cr nn 008maaau
008
201119s2020 cau s 0 eng d
020
$a
9781484254134
$q
(electronic bk.)
020
$a
9781484254127
$q
(paper)
024
7
$a
10.1007/978-1-4842-5413-4
$2
doi
035
$a
978-1-4842-5413-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
C467 2020
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
C549 2020
100
1
$a
Chopra, Abhishek.
$3
3219982
245
1 0
$a
Implementing an information security management system
$h
[electronic resource] :
$b
security management based on ISO 27001 guidelines /
$c
by Abhishek Chopra, Mukund Chaudhary.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2020.
300
$a
xvii, 274 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1 - Need for information security -- Chapter 2 - Step 1: Assessing Needs and Scope -- Chapter 3 - Step 2: Project kick-off -- Chapter 4 - Step 3: Initial Risk Assessment -- Chapter 5 - Step 4: Risk Management Approach -- Chapter 6 - Step 5: Execution -- Chapter 7 - Step 6: Audit -- Chapter 8 - Step 7: Management Review -- Chapter 9 - Step 8: External Audit / Assessment -- Chapter 10 - Continual Improvement.
520
$a
Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You'll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation, post-implementation, and during monitoring of the implemented controls. Implementing an Information Security Management System provides implementation guidelines for ISO 27001:2013 to protect your information assets and ensure a safer enterprise environment. This book is a step-by-step guide on implementing secure ISMS for your organization. It will change the way you interpret and implement information security in your work area or organization. You will: Discover information safeguard methods Implement end-to-end information security Manage risk associated with information security Prepare for audit with associated roles and responsibilities Identify your information risk Protect your information assets.
650
0
$a
Computer security
$x
Management.
$3
590469
650
1 4
$a
Security.
$3
3134865
650
2 4
$a
Enterprise Architecture.
$3
2153150
650
2 4
$a
Information Storage and Retrieval.
$3
761906
700
1
$a
Chaudhary, Mukund.
$3
2158118
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-1-4842-5413-4
950
$a
Professional and Applied Computing (Springer-12059)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9390274
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 C467 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入