Information security risk management for ISO27001/ISO27002:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridgeshire
IT Governance Pub.
2010
|
Schlagworte: | |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (186 pages) color illustrations |
ISBN: | 9781849280440 1849280444 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045349303 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2010 |||| o||u| ||||||eng d | ||
020 | |a 9781849280440 |9 978-1-84928-044-0 | ||
020 | |a 1849280444 |9 1-84928-044-4 | ||
035 | |a (ZDB-4-ITC)ocn742516936 | ||
035 | |a (OCoLC)742516936 | ||
035 | |a (DE-599)BVBBV045349303 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Calder, Alan |d 1957- |e Verfasser |4 aut | |
245 | 1 | 0 | |a Information security risk management for ISO27001/ISO27002 |c Alan Calder, Steve G. Watkins |
264 | 1 | |a Cambridgeshire |b IT Governance Pub. |c 2010 | |
300 | |a 1 online resource (186 pages) |b color illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
505 | 8 | |a Drawing on international best practice, including ISO/IEC 27005, NIST SP800-30 and BS7799-3, the book explains in practical detail how to carry out an information security risk assessment. It covers key topics, such as risk scales, threats and vulnerabilities, selection of controls, and roles and responsibilities, and includes advice on choosing risk assessment software | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 4 | |a Computer networks |x Security measures | |
700 | 1 | |a Watkins, Steve G. |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Calder, Alan, 1957- |t Information security risk management for ISO27001/ISO27002 |d Cambridgeshire : IT Governance Pub., 2010 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030735956 |
Datensatz im Suchindex
_version_ | 1804179173125652480 |
---|---|
any_adam_object | |
author | Calder, Alan 1957- |
author_facet | Calder, Alan 1957- |
author_role | aut |
author_sort | Calder, Alan 1957- |
author_variant | a c ac |
building | Verbundindex |
bvnumber | BV045349303 |
collection | ZDB-4-ITC |
contents | Drawing on international best practice, including ISO/IEC 27005, NIST SP800-30 and BS7799-3, the book explains in practical detail how to carry out an information security risk assessment. It covers key topics, such as risk scales, threats and vulnerabilities, selection of controls, and roles and responsibilities, and includes advice on choosing risk assessment software |
ctrlnum | (ZDB-4-ITC)ocn742516936 (OCoLC)742516936 (DE-599)BVBBV045349303 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01842nmm a2200397zc 4500</leader><controlfield tag="001">BV045349303</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280440</subfield><subfield code="9">978-1-84928-044-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280444</subfield><subfield code="9">1-84928-044-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn742516936</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)742516936</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045349303</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Calder, Alan</subfield><subfield code="d">1957-</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security risk management for ISO27001/ISO27002</subfield><subfield code="c">Alan Calder, Steve G. Watkins</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridgeshire</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (186 pages)</subfield><subfield code="b">color illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Drawing on international best practice, including ISO/IEC 27005, NIST SP800-30 and BS7799-3, the book explains in practical detail how to carry out an information security risk assessment. It covers key topics, such as risk scales, threats and vulnerabilities, selection of controls, and roles and responsibilities, and includes advice on choosing risk assessment software</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Watkins, Steve G.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Calder, Alan, 1957-</subfield><subfield code="t">Information security risk management for ISO27001/ISO27002</subfield><subfield code="d">Cambridgeshire : IT Governance Pub., 2010</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030735956</subfield></datafield></record></collection> |
id | DE-604.BV045349303 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:39Z |
institution | BVB |
isbn | 9781849280440 1849280444 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030735956 |
oclc_num | 742516936 |
open_access_boolean | |
physical | 1 online resource (186 pages) color illustrations |
psigel | ZDB-4-ITC |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Calder, Alan 1957- Verfasser aut Information security risk management for ISO27001/ISO27002 Alan Calder, Steve G. Watkins Cambridgeshire IT Governance Pub. 2010 1 online resource (186 pages) color illustrations txt rdacontent c rdamedia cr rdacarrier Print version record Drawing on international best practice, including ISO/IEC 27005, NIST SP800-30 and BS7799-3, the book explains in practical detail how to carry out an information security risk assessment. It covers key topics, such as risk scales, threats and vulnerabilities, selection of controls, and roles and responsibilities, and includes advice on choosing risk assessment software COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer networks Security measures Watkins, Steve G. Sonstige oth Erscheint auch als Druck-Ausgabe Calder, Alan, 1957- Information security risk management for ISO27001/ISO27002 Cambridgeshire : IT Governance Pub., 2010 |
spellingShingle | Calder, Alan 1957- Information security risk management for ISO27001/ISO27002 Drawing on international best practice, including ISO/IEC 27005, NIST SP800-30 and BS7799-3, the book explains in practical detail how to carry out an information security risk assessment. It covers key topics, such as risk scales, threats and vulnerabilities, selection of controls, and roles and responsibilities, and includes advice on choosing risk assessment software COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer networks Security measures |
title | Information security risk management for ISO27001/ISO27002 |
title_auth | Information security risk management for ISO27001/ISO27002 |
title_exact_search | Information security risk management for ISO27001/ISO27002 |
title_full | Information security risk management for ISO27001/ISO27002 Alan Calder, Steve G. Watkins |
title_fullStr | Information security risk management for ISO27001/ISO27002 Alan Calder, Steve G. Watkins |
title_full_unstemmed | Information security risk management for ISO27001/ISO27002 Alan Calder, Steve G. Watkins |
title_short | Information security risk management for ISO27001/ISO27002 |
title_sort | information security risk management for iso27001 iso27002 |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer networks Security measures |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer networks Security measures |
work_keys_str_mv | AT calderalan informationsecurityriskmanagementforiso27001iso27002 AT watkinssteveg informationsecurityriskmanagementforiso27001iso27002 |