語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Implementing an Information Security...
~
SpringerLink (Online service)
Implementing an Information Security Management System = Security Management Based on ISO 27001 Guidelines /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Implementing an Information Security Management System/ by Abhishek Chopra, Mukund Chaudhary.
其他題名:
Security Management Based on ISO 27001 Guidelines /
作者:
Chopra, Abhishek.
其他作者:
Chaudhary, Mukund.
面頁冊數:
XVII, 274 p. 43 illus., 2 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Information Storage and Retrieval. -
電子資源:
https://doi.org/10.1007/978-1-4842-5413-4
ISBN:
9781484254134
Implementing an Information Security Management System = Security Management Based on ISO 27001 Guidelines /
Chopra, Abhishek.
Implementing an Information Security Management System
Security Management Based on ISO 27001 Guidelines /[electronic resource] :by Abhishek Chopra, Mukund Chaudhary. - 1st ed. 2020. - XVII, 274 p. 43 illus., 2 illus. in color.online resource.
Chapter 1 - Need for information security -- Chapter 2 – Step 1: Assessing Needs and Scope -- Chapter 3 – Step 2: Project kick-off -- Chapter 4 – Step 3: Initial Risk Assessment -- Chapter 5 – Step 4: Risk Management Approach -- Chapter 6 – Step 5: Execution -- Chapter 7 – Step 6: Audit -- Chapter 8 – Step 7: Management Review -- Chapter 9 – Step 8: External Audit / Assessment -- Chapter 10 – Continual Improvement.
Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation, post-implementation, and during monitoring of the implemented controls. Implementing an Information Security Management System provides implementation guidelines for ISO 27001:2013 to protect your information assets and ensure a safer enterprise environment. This book is a step-by-step guide on implementing secure ISMS for your organization. It will change the way you interpret and implement information security in your work area or organization. You will: Discover information safeguard methods Implement end-to-end information security Manage risk associated with information security Prepare for audit with associated roles and responsibilities Identify your information risk Protect your information assets.
ISBN: 9781484254134
Standard No.: 10.1007/978-1-4842-5413-4doiSubjects--Topical Terms:
593926
Information Storage and Retrieval.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Implementing an Information Security Management System = Security Management Based on ISO 27001 Guidelines /
LDR
:02886nam a22003975i 4500
001
1027437
003
DE-He213
005
20201110141724.0
007
cr nn 008mamaa
008
210318s2020 xxu| s |||| 0|eng d
020
$a
9781484254134
$9
978-1-4842-5413-4
024
7
$a
10.1007/978-1-4842-5413-4
$2
doi
035
$a
978-1-4842-5413-4
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Chopra, Abhishek.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1250076
245
1 0
$a
Implementing an Information Security Management System
$h
[electronic resource] :
$b
Security Management Based on ISO 27001 Guidelines /
$c
by Abhishek Chopra, Mukund Chaudhary.
250
$a
1st ed. 2020.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2020.
300
$a
XVII, 274 p. 43 illus., 2 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1 - Need for information security -- Chapter 2 – Step 1: Assessing Needs and Scope -- Chapter 3 – Step 2: Project kick-off -- Chapter 4 – Step 3: Initial Risk Assessment -- Chapter 5 – Step 4: Risk Management Approach -- Chapter 6 – Step 5: Execution -- Chapter 7 – Step 6: Audit -- Chapter 8 – Step 7: Management Review -- Chapter 9 – Step 8: External Audit / Assessment -- Chapter 10 – Continual Improvement.
520
$a
Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation, post-implementation, and during monitoring of the implemented controls. Implementing an Information Security Management System provides implementation guidelines for ISO 27001:2013 to protect your information assets and ensure a safer enterprise environment. This book is a step-by-step guide on implementing secure ISMS for your organization. It will change the way you interpret and implement information security in your work area or organization. You will: Discover information safeguard methods Implement end-to-end information security Manage risk associated with information security Prepare for audit with associated roles and responsibilities Identify your information risk Protect your information assets.
650
2 4
$a
Information Storage and Retrieval.
$3
593926
650
2 4
$a
Enterprise Architecture.
$3
1067035
650
1 4
$a
Security.
$3
1114130
650
0
$a
Information storage and retrieval.
$3
1069252
650
0
$a
Management information systems.
$3
561123
650
0
$a
Data protection.
$3
557764
700
1
$a
Chaudhary, Mukund.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1067589
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484254127
776
0 8
$i
Printed edition:
$z
9781484254141
776
0 8
$i
Printed edition:
$z
9781484267677
856
4 0
$u
https://doi.org/10.1007/978-1-4842-5413-4
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入