The case for ISO27001: 2013
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
United Kingdom
IT Governance Publishing
2013
|
Ausgabe: | Second edition |
Schlagworte: | |
Online-Zugang: | FLA01 |
Beschreibung: | Online resource; title from PDF title page (JSTOR, viewed March 21, 2014) Print version record |
Beschreibung: | 1 online resource |
ISBN: | 9781849285315 1849285314 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045357236 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181212s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781849285315 |9 978-1-84928-531-5 | ||
020 | |a 1849285314 |9 1-84928-531-4 | ||
035 | |a (ZDB-4-EBU)ocn876049154 | ||
035 | |a (OCoLC)876049154 | ||
035 | |a (DE-599)BVBBV045357236 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Calder, Alan |d 1957- |e Verfasser |4 aut | |
245 | 1 | 0 | |a The case for ISO27001 |b 2013 |c Alan Calder |
250 | |a Second edition | ||
264 | 1 | |a United Kingdom |b IT Governance Publishing |c 2013 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Online resource; title from PDF title page (JSTOR, viewed March 21, 2014) | ||
500 | |a Print version record | ||
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Business enterprises / Computer networks / Security measures |2 fast | |
650 | 7 | |a Confidential business information |2 fast | |
650 | 7 | |a Cyberterrorism |2 fast | |
650 | 4 | |a Business enterprises |x Computer networks |x Security measures |a Computer security |x Management |x Standards |a Data protection |x Management |x Standards |a Confidential business information |a Cyberterrorism | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Calder, Alan, 1957- |t Case for ISO27001 : 2013 |b Second edition |z 9781849285315 |
912 | |a ZDB-4-EBU | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030743827 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=838720 |l FLA01 |p ZDB-4-EBU |q FLA_PDA_EBU |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804179187579224064 |
---|---|
any_adam_object | |
author | Calder, Alan 1957- |
author_facet | Calder, Alan 1957- |
author_role | aut |
author_sort | Calder, Alan 1957- |
author_variant | a c ac |
building | Verbundindex |
bvnumber | BV045357236 |
collection | ZDB-4-EBU |
ctrlnum | (ZDB-4-EBU)ocn876049154 (OCoLC)876049154 (DE-599)BVBBV045357236 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Second edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01775nmm a2200421zc 4500</leader><controlfield tag="001">BV045357236</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181212s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849285315</subfield><subfield code="9">978-1-84928-531-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849285314</subfield><subfield code="9">1-84928-531-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBU)ocn876049154</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)876049154</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045357236</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Calder, Alan</subfield><subfield code="d">1957-</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The case for ISO27001</subfield><subfield code="b">2013</subfield><subfield code="c">Alan Calder</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">United Kingdom</subfield><subfield code="b">IT Governance Publishing</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from PDF title page (JSTOR, viewed March 21, 2014)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business enterprises / Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Confidential business information</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="x">Standards</subfield><subfield code="a">Data protection</subfield><subfield code="x">Management</subfield><subfield code="x">Standards</subfield><subfield code="a">Confidential business information</subfield><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Calder, Alan, 1957-</subfield><subfield code="t">Case for ISO27001 : 2013</subfield><subfield code="b">Second edition</subfield><subfield code="z">9781849285315</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030743827</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=838720</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FLA_PDA_EBU</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045357236 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:15:53Z |
institution | BVB |
isbn | 9781849285315 1849285314 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030743827 |
oclc_num | 876049154 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-4-EBU ZDB-4-EBU FLA_PDA_EBU |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | IT Governance Publishing |
record_format | marc |
spelling | Calder, Alan 1957- Verfasser aut The case for ISO27001 2013 Alan Calder Second edition United Kingdom IT Governance Publishing 2013 1 online resource txt rdacontent c rdamedia cr rdacarrier Online resource; title from PDF title page (JSTOR, viewed March 21, 2014) Print version record COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Business enterprises / Computer networks / Security measures fast Confidential business information fast Cyberterrorism fast Business enterprises Computer networks Security measures Computer security Management Standards Data protection Management Standards Confidential business information Cyberterrorism Erscheint auch als Druck-Ausgabe Calder, Alan, 1957- Case for ISO27001 : 2013 Second edition 9781849285315 |
spellingShingle | Calder, Alan 1957- The case for ISO27001 2013 COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Business enterprises / Computer networks / Security measures fast Confidential business information fast Cyberterrorism fast Business enterprises Computer networks Security measures Computer security Management Standards Data protection Management Standards Confidential business information Cyberterrorism |
title | The case for ISO27001 2013 |
title_auth | The case for ISO27001 2013 |
title_exact_search | The case for ISO27001 2013 |
title_full | The case for ISO27001 2013 Alan Calder |
title_fullStr | The case for ISO27001 2013 Alan Calder |
title_full_unstemmed | The case for ISO27001 2013 Alan Calder |
title_short | The case for ISO27001 |
title_sort | the case for iso27001 2013 |
title_sub | 2013 |
topic | COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Business enterprises / Computer networks / Security measures fast Confidential business information fast Cyberterrorism fast Business enterprises Computer networks Security measures Computer security Management Standards Data protection Management Standards Confidential business information Cyberterrorism |
topic_facet | COMPUTERS / Networking / Security COMPUTERS / Security / General Business enterprises / Computer networks / Security measures Confidential business information Cyberterrorism Business enterprises Computer networks Security measures Computer security Management Standards Data protection Management Standards Confidential business information Cyberterrorism |
work_keys_str_mv | AT calderalan thecaseforiso270012013 |