Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berkeley, CA
Apress
2020
Berkeley, CA |
Ausgabe: | First edition 2020 |
Schlagworte: | |
Online-Zugang: | FAB01 FAW01 FHA01 FHD01 FHI01 FHM01 FHN01 FHO01 FHR01 FKE01 FLA01 FWS01 FWS02 HTW01 UBW01 Volltext |
Beschreibung: | 1 Online-Ressource (XVII, 274 Seiten) 43 Illustrationen, 2 Illustrationen (farbig) |
ISBN: | 9781484254134 |
DOI: | 10.1007/978-1-4842-5413-4 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046325547 | ||
003 | DE-604 | ||
005 | 20200116 | ||
007 | cr|uuu---uuuuu | ||
008 | 200109s2020 |||| o||u| ||||||eng d | ||
020 | |a 9781484254134 |c Online |9 978-1-4842-5413-4 | ||
024 | 7 | |a 10.1007/978-1-4842-5413-4 |2 doi | |
035 | |a (ZDB-2-CWD)9781484254134 | ||
035 | |a (OCoLC)1136485495 | ||
035 | |a (DE-599)BVBBV046325547 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1043 |a DE-Aug4 |a DE-898 |a DE-M347 |a DE-573 |a DE-523 |a DE-859 |a DE-863 |a DE-1050 |a DE-20 |a DE-1051 |a DE-862 |a DE-92 |a DE-860 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Chopra, Abhishek |e Verfasser |0 (DE-588)1202938981 |4 aut | |
245 | 1 | 0 | |a Implementing an Information Security Management System |b Security Management Based on ISO 27001 Guidelines |c by Abhishek Chopra, Mukund Chaudhary |
250 | |a First edition 2020 | ||
264 | 1 | |a Berkeley, CA |b Apress |c 2020 | |
264 | 1 | |a Berkeley, CA |b Apress | |
300 | |a 1 Online-Ressource (XVII, 274 Seiten) |b 43 Illustrationen, 2 Illustrationen (farbig) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Security | |
650 | 4 | |a Enterprise Architecture | |
650 | 4 | |a Information Storage and Retrieval | |
650 | 4 | |a Data protection | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Information storage and retrieval | |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Chaudhary, Mukund |e Verfasser |0 (DE-588)1202939104 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-4842-5412-7 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-4842-5414-1 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4842-5413-4 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-CWD | ||
940 | 1 | |q ZDB-2-CWD_2020 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-031702497 | ||
966 | e | |u https://doi.org/10.1007/978-1-4842-5413-4 |l FAB01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-5413-4 |l FAW01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-5413-4 |l FHA01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-5413-4 |l FHD01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-5413-4 |l FHI01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-5413-4 |l FHM01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-5413-4 |l FHN01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-5413-4 |l FHO01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-5413-4 |l FHR01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-5413-4 |l FKE01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-5413-4 |l FLA01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-5413-4 |l FWS01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-5413-4 |l FWS02 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-5413-4 |l HTW01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-5413-4 |l UBW01 |p ZDB-2-CWD |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 746273 |
---|---|
_version_ | 1806190379847909376 |
any_adam_object | |
author | Chopra, Abhishek Chaudhary, Mukund |
author_GND | (DE-588)1202938981 (DE-588)1202939104 |
author_facet | Chopra, Abhishek Chaudhary, Mukund |
author_role | aut aut |
author_sort | Chopra, Abhishek |
author_variant | a c ac m c mc |
building | Verbundindex |
bvnumber | BV046325547 |
classification_rvk | ST 276 |
collection | ZDB-2-CWD |
ctrlnum | (ZDB-2-CWD)9781484254134 (OCoLC)1136485495 (DE-599)BVBBV046325547 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-1-4842-5413-4 |
edition | First edition 2020 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03534nmm a2200709zc 4500</leader><controlfield tag="001">BV046325547</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200116 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200109s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484254134</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4842-5413-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4842-5413-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-CWD)9781484254134</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1136485495</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046325547</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-860</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Chopra, Abhishek</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1202938981</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Implementing an Information Security Management System</subfield><subfield code="b">Security Management Based on ISO 27001 Guidelines</subfield><subfield code="c">by Abhishek Chopra, Mukund Chaudhary</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition 2020</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield><subfield code="c">2020</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVII, 274 Seiten)</subfield><subfield code="b">43 Illustrationen, 2 Illustrationen (farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Enterprise Architecture</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Storage and Retrieval</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information storage and retrieval</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chaudhary, Mukund</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1202939104</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-4842-5412-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-4842-5414-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4842-5413-4</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-CWD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-CWD_2020</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031702497</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-5413-4</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-5413-4</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-5413-4</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-5413-4</subfield><subfield code="l">FHD01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-5413-4</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-5413-4</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-5413-4</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-5413-4</subfield><subfield code="l">FHO01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-5413-4</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-5413-4</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-5413-4</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-5413-4</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-5413-4</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-5413-4</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-5413-4</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046325547 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T15:02:55Z |
institution | BVB |
isbn | 9781484254134 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031702497 |
oclc_num | 1136485495 |
open_access_boolean | |
owner | DE-1046 DE-1043 DE-Aug4 DE-898 DE-BY-UBR DE-M347 DE-573 DE-523 DE-859 DE-863 DE-BY-FWS DE-1050 DE-20 DE-1051 DE-862 DE-BY-FWS DE-92 DE-860 |
owner_facet | DE-1046 DE-1043 DE-Aug4 DE-898 DE-BY-UBR DE-M347 DE-573 DE-523 DE-859 DE-863 DE-BY-FWS DE-1050 DE-20 DE-1051 DE-862 DE-BY-FWS DE-92 DE-860 |
physical | 1 Online-Ressource (XVII, 274 Seiten) 43 Illustrationen, 2 Illustrationen (farbig) |
psigel | ZDB-2-CWD ZDB-2-CWD_2020 |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Apress |
record_format | marc |
spellingShingle | Chopra, Abhishek Chaudhary, Mukund Implementing an Information Security Management System Security Management Based on ISO 27001 Guidelines Security Enterprise Architecture Information Storage and Retrieval Data protection Management information systems Information storage and retrieval Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4274324-2 |
title | Implementing an Information Security Management System Security Management Based on ISO 27001 Guidelines |
title_auth | Implementing an Information Security Management System Security Management Based on ISO 27001 Guidelines |
title_exact_search | Implementing an Information Security Management System Security Management Based on ISO 27001 Guidelines |
title_full | Implementing an Information Security Management System Security Management Based on ISO 27001 Guidelines by Abhishek Chopra, Mukund Chaudhary |
title_fullStr | Implementing an Information Security Management System Security Management Based on ISO 27001 Guidelines by Abhishek Chopra, Mukund Chaudhary |
title_full_unstemmed | Implementing an Information Security Management System Security Management Based on ISO 27001 Guidelines by Abhishek Chopra, Mukund Chaudhary |
title_short | Implementing an Information Security Management System |
title_sort | implementing an information security management system security management based on iso 27001 guidelines |
title_sub | Security Management Based on ISO 27001 Guidelines |
topic | Security Enterprise Architecture Information Storage and Retrieval Data protection Management information systems Information storage and retrieval Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Security Enterprise Architecture Information Storage and Retrieval Data protection Management information systems Information storage and retrieval Datenschutz Computersicherheit |
url | https://doi.org/10.1007/978-1-4842-5413-4 |
work_keys_str_mv | AT chopraabhishek implementinganinformationsecuritymanagementsystemsecuritymanagementbasedoniso27001guidelines AT chaudharymukund implementinganinformationsecuritymanagementsystemsecuritymanagementbasedoniso27001guidelines |