ISO27001 in a Windows environment: the best practice handbook for a Microsoft Windows environment
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely, UK
IT Governance
2010
|
Ausgabe: | 2nd ed |
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Title from title screen. - First ed. published as: Implementing ISO27001 in a Windows environment : the best practice implementation handbook for a Microsoft Windows environment Includes bibliographical references INTRODUCTION; CHAPTER 1: INFORMATION AND INFORMATION SECURITY; CHAPTER 2: USING AN ISMS TO COUNTER THE THREATS; CHAPTER 3: AN INTRODUCTION TO ISO27001; CHAPTER 4: IDENTIFY YOUR INFORMATION ASSETS; CHAPTER 5: CONDUCTING A RISK ASSESSMENT; CHAPTER 6: AN OVERVIEW OF MICROSOFT TECHNOLOGIES; CHAPTER 7: IMPLEMENTING ISO27001 IN A MICROSOFT ENVIRONMENT; CHAPTER 8: SECURING THE WINDOWS ENVIRONMENT; CHAPTER 9: SECURING THE MICROSOFT WINDOWS SERVER PLATFORM; CHAPTER 10: AUDITING AND MONITORING; CHAPTER 11: SECURING YOUR SERVERS Ideal for project managers, IT and security staff, this book plugs the gap in current guidance literature for ISO27001. ISO27001, the information security management standard (ISMS), is providing a significant challenge for many organisations. One of the key areas of confusion is the relationship between the ISO27001 ISMS project manager and those responsible for implementing the technical controls |
Beschreibung: | 1 Online-Ressource |
ISBN: | 1849280495 1849280509 9781849280495 9781849280501 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043133919 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2010 |||| o||u| ||||||eng d | ||
020 | |a 1849280495 |9 1-84928-049-5 | ||
020 | |a 1849280509 |c electronic bk. |9 1-84928-050-9 | ||
020 | |a 9781849280495 |9 978-1-84928-049-5 | ||
020 | |a 9781849280501 |c electronic bk. |9 978-1-84928-050-1 | ||
035 | |a (OCoLC)670292245 | ||
035 | |a (DE-599)BVBBV043133919 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8/0218 |2 22 | |
100 | 1 | |a Honan, Brian |e Verfasser |4 aut | |
245 | 1 | 0 | |a ISO27001 in a Windows environment |b the best practice handbook for a Microsoft Windows environment |c Brian Honan |
250 | |a 2nd ed | ||
264 | 1 | |a Ely, UK |b IT Governance |c 2010 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from title screen. - First ed. published as: Implementing ISO27001 in a Windows environment : the best practice implementation handbook for a Microsoft Windows environment | ||
500 | |a Includes bibliographical references | ||
500 | |a INTRODUCTION; CHAPTER 1: INFORMATION AND INFORMATION SECURITY; CHAPTER 2: USING AN ISMS TO COUNTER THE THREATS; CHAPTER 3: AN INTRODUCTION TO ISO27001; CHAPTER 4: IDENTIFY YOUR INFORMATION ASSETS; CHAPTER 5: CONDUCTING A RISK ASSESSMENT; CHAPTER 6: AN OVERVIEW OF MICROSOFT TECHNOLOGIES; CHAPTER 7: IMPLEMENTING ISO27001 IN A MICROSOFT ENVIRONMENT; CHAPTER 8: SECURING THE WINDOWS ENVIRONMENT; CHAPTER 9: SECURING THE MICROSOFT WINDOWS SERVER PLATFORM; CHAPTER 10: AUDITING AND MONITORING; CHAPTER 11: SECURING YOUR SERVERS | ||
500 | |a Ideal for project managers, IT and security staff, this book plugs the gap in current guidance literature for ISO27001. ISO27001, the information security management standard (ISMS), is providing a significant challenge for many organisations. One of the key areas of confusion is the relationship between the ISO27001 ISMS project manager and those responsible for implementing the technical controls | ||
630 | 0 | 4 | |a Microsoft Windows (Computer file) |
650 | 4 | |a Microsoft Windows (Computer file) | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Data protection |x Standards | |
650 | 4 | |a Data protection |x Evaluation | |
700 | 1 | |a Honan, Brian |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391093 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028558110 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391093 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391093 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175576160796672 |
---|---|
any_adam_object | |
author | Honan, Brian |
author_facet | Honan, Brian |
author_role | aut |
author_sort | Honan, Brian |
author_variant | b h bh |
building | Verbundindex |
bvnumber | BV043133919 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)670292245 (DE-599)BVBBV043133919 |
dewey-full | 005.8/0218 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/0218 |
dewey-search | 005.8/0218 |
dewey-sort | 15.8 3218 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03139nmm a2200517zc 4500</leader><controlfield tag="001">BV043133919</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280495</subfield><subfield code="9">1-84928-049-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280509</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-84928-050-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280495</subfield><subfield code="9">978-1-84928-049-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280501</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-84928-050-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)670292245</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043133919</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/0218</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Honan, Brian</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">ISO27001 in a Windows environment</subfield><subfield code="b">the best practice handbook for a Microsoft Windows environment</subfield><subfield code="c">Brian Honan</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely, UK</subfield><subfield code="b">IT Governance</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from title screen. - First ed. published as: Implementing ISO27001 in a Windows environment : the best practice implementation handbook for a Microsoft Windows environment</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">INTRODUCTION; CHAPTER 1: INFORMATION AND INFORMATION SECURITY; CHAPTER 2: USING AN ISMS TO COUNTER THE THREATS; CHAPTER 3: AN INTRODUCTION TO ISO27001; CHAPTER 4: IDENTIFY YOUR INFORMATION ASSETS; CHAPTER 5: CONDUCTING A RISK ASSESSMENT; CHAPTER 6: AN OVERVIEW OF MICROSOFT TECHNOLOGIES; CHAPTER 7: IMPLEMENTING ISO27001 IN A MICROSOFT ENVIRONMENT; CHAPTER 8: SECURING THE WINDOWS ENVIRONMENT; CHAPTER 9: SECURING THE MICROSOFT WINDOWS SERVER PLATFORM; CHAPTER 10: AUDITING AND MONITORING; CHAPTER 11: SECURING YOUR SERVERS</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Ideal for project managers, IT and security staff, this book plugs the gap in current guidance literature for ISO27001. ISO27001, the information security management standard (ISMS), is providing a significant challenge for many organisations. One of the key areas of confusion is the relationship between the ISO27001 ISMS project manager and those responsible for implementing the technical controls</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="x">Standards</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="x">Evaluation</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Honan, Brian</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391093</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028558110</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391093</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391093</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043133919 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:29Z |
institution | BVB |
isbn | 1849280495 1849280509 9781849280495 9781849280501 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028558110 |
oclc_num | 670292245 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | IT Governance |
record_format | marc |
spelling | Honan, Brian Verfasser aut ISO27001 in a Windows environment the best practice handbook for a Microsoft Windows environment Brian Honan 2nd ed Ely, UK IT Governance 2010 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Title from title screen. - First ed. published as: Implementing ISO27001 in a Windows environment : the best practice implementation handbook for a Microsoft Windows environment Includes bibliographical references INTRODUCTION; CHAPTER 1: INFORMATION AND INFORMATION SECURITY; CHAPTER 2: USING AN ISMS TO COUNTER THE THREATS; CHAPTER 3: AN INTRODUCTION TO ISO27001; CHAPTER 4: IDENTIFY YOUR INFORMATION ASSETS; CHAPTER 5: CONDUCTING A RISK ASSESSMENT; CHAPTER 6: AN OVERVIEW OF MICROSOFT TECHNOLOGIES; CHAPTER 7: IMPLEMENTING ISO27001 IN A MICROSOFT ENVIRONMENT; CHAPTER 8: SECURING THE WINDOWS ENVIRONMENT; CHAPTER 9: SECURING THE MICROSOFT WINDOWS SERVER PLATFORM; CHAPTER 10: AUDITING AND MONITORING; CHAPTER 11: SECURING YOUR SERVERS Ideal for project managers, IT and security staff, this book plugs the gap in current guidance literature for ISO27001. ISO27001, the information security management standard (ISMS), is providing a significant challenge for many organisations. One of the key areas of confusion is the relationship between the ISO27001 ISMS project manager and those responsible for implementing the technical controls Microsoft Windows (Computer file) Protection de l'information (Informatique) COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Data protection Standards Data protection Evaluation Honan, Brian Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391093 Aggregator Volltext |
spellingShingle | Honan, Brian ISO27001 in a Windows environment the best practice handbook for a Microsoft Windows environment Microsoft Windows (Computer file) Protection de l'information (Informatique) COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Data protection Standards Data protection Evaluation |
title | ISO27001 in a Windows environment the best practice handbook for a Microsoft Windows environment |
title_auth | ISO27001 in a Windows environment the best practice handbook for a Microsoft Windows environment |
title_exact_search | ISO27001 in a Windows environment the best practice handbook for a Microsoft Windows environment |
title_full | ISO27001 in a Windows environment the best practice handbook for a Microsoft Windows environment Brian Honan |
title_fullStr | ISO27001 in a Windows environment the best practice handbook for a Microsoft Windows environment Brian Honan |
title_full_unstemmed | ISO27001 in a Windows environment the best practice handbook for a Microsoft Windows environment Brian Honan |
title_short | ISO27001 in a Windows environment |
title_sort | iso27001 in a windows environment the best practice handbook for a microsoft windows environment |
title_sub | the best practice handbook for a Microsoft Windows environment |
topic | Microsoft Windows (Computer file) Protection de l'information (Informatique) COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Data protection Standards Data protection Evaluation |
topic_facet | Microsoft Windows (Computer file) Protection de l'information (Informatique) COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Data protection Standards Data protection Evaluation |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391093 |
work_keys_str_mv | AT honanbrian iso27001inawindowsenvironmentthebestpracticehandbookforamicrosoftwindowsenvironment |