IT governance an international guide to data security and ISO 27001/ISO 27002

As cyber threats continue to increase in prevalence and ferocity, it is more important than ever to implement a secure ISMS to protect your organisation. Certifying your ISMS to ISO 27001 and ISO 27002 demonstrates to customers and stakeholders that your organisation is handling data securely.

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Calder, Alan 1957- (VerfasserIn), Watkins, Steve 1970- (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Ely, Cambridgeshire IT Governance Publishing Ltd 2024
Ausgabe:Eighth edition.
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a22000002 4500
001 ZDB-30-ORH-106393022
003 DE-627-1
005 20240819122017.0
007 cr uuu---uuuuu
008 240819s2024 xx |||||o 00| ||eng c
020 |a 9781787784109  |c electronic bk.  |9 978-1-78778-410-9 
020 |a 178778410X  |c electronic bk.  |9 1-78778-410-X 
035 |a (DE-627-1)106393022 
035 |a (DE-599)KEP106393022 
035 |a (ORHE)9781787784109 
035 |a (DE-627-1)106393022 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8  |2 23/eng/20240709 
100 1 |a Calder, Alan  |d 1957-  |e VerfasserIn  |4 aut 
245 1 0 |a IT governance  |b an international guide to data security and ISO 27001/ISO 27002  |c Alan Calder and Steve Watkins 
246 3 3 |a International guide to data security and ISO 27001/ISO 27002 
250 |a Eighth edition. 
264 1 |a Ely, Cambridgeshire  |b IT Governance Publishing Ltd  |c 2024 
300 |a 1 online resource (486 pages) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Includes bibliographical references and index 
520 |a As cyber threats continue to increase in prevalence and ferocity, it is more important than ever to implement a secure ISMS to protect your organisation. Certifying your ISMS to ISO 27001 and ISO 27002 demonstrates to customers and stakeholders that your organisation is handling data securely. 
650 0 |a Computer security 
650 0 |a Data protection 
650 0 |a Business enterprises  |x Computer networks  |x Security measures 
650 4 |a Sécurité informatique 
650 4 |a Protection de l'information (Informatique) 
700 1 |a Watkins, Steve  |d 1970-  |e VerfasserIn  |4 aut 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781787784109/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-106393022
_version_ 1818767366287261696
adam_text
any_adam_object
author Calder, Alan 1957-
Watkins, Steve 1970-
author_facet Calder, Alan 1957-
Watkins, Steve 1970-
author_role aut
aut
author_sort Calder, Alan 1957-
author_variant a c ac
s w sw
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)106393022
(DE-599)KEP106393022
(ORHE)9781787784109
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition Eighth edition.
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01916nam a22004332 4500</leader><controlfield tag="001">ZDB-30-ORH-106393022</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240819122017.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240819s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781787784109</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-78778-410-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">178778410X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-78778-410-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)106393022</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP106393022</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781787784109</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)106393022</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240709</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Calder, Alan</subfield><subfield code="d">1957-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IT governance</subfield><subfield code="b">an international guide to data security and ISO 27001/ISO 27002</subfield><subfield code="c">Alan Calder and Steve Watkins</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">International guide to data security and ISO 27001/ISO 27002</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Eighth edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely, Cambridgeshire</subfield><subfield code="b">IT Governance Publishing Ltd</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (486 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">As cyber threats continue to increase in prevalence and ferocity, it is more important than ever to implement a secure ISMS to protect your organisation. Certifying your ISMS to ISO 27001 and ISO 27002 demonstrates to customers and stakeholders that your organisation is handling data securely.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Watkins, Steve</subfield><subfield code="d">1970-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781787784109/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-106393022
illustrated Not Illustrated
indexdate 2024-12-18T08:48:44Z
institution BVB
isbn 9781787784109
178778410X
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (486 pages)
psigel ZDB-30-ORH
publishDate 2024
publishDateSearch 2024
publishDateSort 2024
publisher IT Governance Publishing Ltd
record_format marc
spelling Calder, Alan 1957- VerfasserIn aut
IT governance an international guide to data security and ISO 27001/ISO 27002 Alan Calder and Steve Watkins
International guide to data security and ISO 27001/ISO 27002
Eighth edition.
Ely, Cambridgeshire IT Governance Publishing Ltd 2024
1 online resource (486 pages)
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Includes bibliographical references and index
As cyber threats continue to increase in prevalence and ferocity, it is more important than ever to implement a secure ISMS to protect your organisation. Certifying your ISMS to ISO 27001 and ISO 27002 demonstrates to customers and stakeholders that your organisation is handling data securely.
Computer security
Data protection
Business enterprises Computer networks Security measures
Sécurité informatique
Protection de l'information (Informatique)
Watkins, Steve 1970- VerfasserIn aut
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781787784109/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Calder, Alan 1957-
Watkins, Steve 1970-
IT governance an international guide to data security and ISO 27001/ISO 27002
Computer security
Data protection
Business enterprises Computer networks Security measures
Sécurité informatique
Protection de l'information (Informatique)
title IT governance an international guide to data security and ISO 27001/ISO 27002
title_alt International guide to data security and ISO 27001/ISO 27002
title_auth IT governance an international guide to data security and ISO 27001/ISO 27002
title_exact_search IT governance an international guide to data security and ISO 27001/ISO 27002
title_full IT governance an international guide to data security and ISO 27001/ISO 27002 Alan Calder and Steve Watkins
title_fullStr IT governance an international guide to data security and ISO 27001/ISO 27002 Alan Calder and Steve Watkins
title_full_unstemmed IT governance an international guide to data security and ISO 27001/ISO 27002 Alan Calder and Steve Watkins
title_short IT governance
title_sort it governance an international guide to data security and iso 27001 iso 27002
title_sub an international guide to data security and ISO 27001/ISO 27002
topic Computer security
Data protection
Business enterprises Computer networks Security measures
Sécurité informatique
Protection de l'information (Informatique)
topic_facet Computer security
Data protection
Business enterprises Computer networks Security measures
Sécurité informatique
Protection de l'information (Informatique)
url https://learning.oreilly.com/library/view/-/9781787784109/?ar
work_keys_str_mv AT calderalan itgovernanceaninternationalguidetodatasecurityandiso27001iso27002
AT watkinssteve itgovernanceaninternationalguidetodatasecurityandiso27001iso27002
AT calderalan internationalguidetodatasecurityandiso27001iso27002
AT watkinssteve internationalguidetodatasecurityandiso27001iso27002