Information security breaches :: avoidance treatment based on ISO27001 /
This book helps you to manage a security breach by detailing what to do as soon as you discover a breach. Be prepared, be prompt, be decisive. When your organisation's security is compromised, you cannot afford to waste time deciding how to resolve the issue. Updated to cover ISO27001:2013, thi...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely, Cambridgeshire, UK :
IT Governance Press,
©2014.
|
Ausgabe: | 2nd ed. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | This book helps you to manage a security breach by detailing what to do as soon as you discover a breach. Be prepared, be prompt, be decisive. When your organisation's security is compromised, you cannot afford to waste time deciding how to resolve the issue. Updated to cover ISO27001:2013, this second edition gives you clear guidance on how to treat an information security breach and tells you the plans and procedures you have to put in place to minimise damage and return to business as usual. A recovery plan will help you to: recover, and resume normal operations, more quickly; preserve customer confidence by quickly resolving service disruption; secure evidence to help with any criminal investigation and improve your chances of catching those responsible. Read this guide and find out how to manage in the face of a data breach. -- |
Beschreibung: | 1 online resource (1 volume) : illustrations |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9781849285841 1849285845 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn888035953 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 140820s2014 enka ob 000 0 eng d | ||
040 | |a UMI |b eng |e pn |c UMI |d EBLCP |d B24X7 |d STF |d COO |d DEBSZ |d DEBBG |d JSTOR |d YDXCP |d OCLCF |d OCLCQ |d N$T |d OCLCQ |d ICA |d AGLDB |d MERUC |d OCLCQ |d IOG |d OCLCA |d VTS |d CEF |d OCLCQ |d LVT |d AU@ |d OCLCQ |d K6U |d UKAHL |d RDF |d SNU |d VLY |d BRF |d EYM |d QGK |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d SXB | ||
019 | |a 966372826 |a 1060197336 |a 1100957411 |a 1162439283 |a 1179662446 |a 1194741139 |a 1241771245 | ||
020 | |a 9781849285841 |q (electronic bk.) | ||
020 | |a 1849285845 |q (electronic bk.) | ||
020 | |z 1849285837 | ||
020 | |z 9781849285834 | ||
035 | |a (OCoLC)888035953 |z (OCoLC)966372826 |z (OCoLC)1060197336 |z (OCoLC)1100957411 |z (OCoLC)1162439283 |z (OCoLC)1179662446 |z (OCoLC)1194741139 |z (OCoLC)1241771245 | ||
037 | |a CL0500000466 |b Safari Books Online | ||
037 | |a 22573/ctt7z4pbd |b JSTOR | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 7 | |a 005.8 | |
049 | |a MAIN | ||
100 | 1 | |a Krausz, Michael. |0 http://id.loc.gov/authorities/names/no2011004375 | |
245 | 1 | 0 | |a Information security breaches : |b avoidance treatment based on ISO27001 / |c Michael Krausz. |
250 | |a 2nd ed. | ||
260 | |a Ely, Cambridgeshire, UK : |b IT Governance Press, |c ©2014. | ||
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
588 | 0 | |a Online resource; title from title page (Safari, viewed August 9, 2014). | |
520 | |a This book helps you to manage a security breach by detailing what to do as soon as you discover a breach. Be prepared, be prompt, be decisive. When your organisation's security is compromised, you cannot afford to waste time deciding how to resolve the issue. Updated to cover ISO27001:2013, this second edition gives you clear guidance on how to treat an information security breach and tells you the plans and procedures you have to put in place to minimise damage and return to business as usual. A recovery plan will help you to: recover, and resume normal operations, more quickly; preserve customer confidence by quickly resolving service disruption; secure evidence to help with any criminal investigation and improve your chances of catching those responsible. Read this guide and find out how to manage in the face of a data breach. -- |c Edited summary from book. | ||
504 | |a Includes bibliographical references. | ||
505 | 0 | |a Cover; Title; Copyright; Contents; Introduction; Chapter 1: What constitutes a breach?; Chapter 2: Treatment using ISO27001; Assess the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft the report; Final decision; Follow up with tenacity; Review; How ISO27001 supports the treatment of breaches; Chapter 3: Case studies; Case study 1 -- small company; Case study 2 -- small company; Case study 3 -- medium-sized company; Case study 4 -- large company; ITG Resources | |
546 | |a English. | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Hacking. |0 http://id.loc.gov/authorities/subjects/sh2013002597 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Piratage informatique. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Hacking |2 fast | |
655 | 4 | |a Electronic book. | |
758 | |i has work: |a Information security breaches (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGkXTKrKyhxpX68yBjkXYd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | |z 1849285837 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=838731 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH28339360 | ||
938 | |a Books 24x7 |b B247 |n bks00069070 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL1778763 | ||
938 | |a EBSCOhost |b EBSC |n 838731 | ||
938 | |a YBP Library Services |b YANK |n 12023457 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn888035953 |
---|---|
_version_ | 1816882282863001600 |
adam_text | |
any_adam_object | |
author | Krausz, Michael |
author_GND | http://id.loc.gov/authorities/names/no2011004375 |
author_facet | Krausz, Michael |
author_role | |
author_sort | Krausz, Michael |
author_variant | m k mk |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover; Title; Copyright; Contents; Introduction; Chapter 1: What constitutes a breach?; Chapter 2: Treatment using ISO27001; Assess the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft the report; Final decision; Follow up with tenacity; Review; How ISO27001 supports the treatment of breaches; Chapter 3: Case studies; Case study 1 -- small company; Case study 2 -- small company; Case study 3 -- medium-sized company; Case study 4 -- large company; ITG Resources |
ctrlnum | (OCoLC)888035953 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04399cam a2200673 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn888035953</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">140820s2014 enka ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">EBLCP</subfield><subfield code="d">B24X7</subfield><subfield code="d">STF</subfield><subfield code="d">COO</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">DEBBG</subfield><subfield code="d">JSTOR</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ICA</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IOG</subfield><subfield code="d">OCLCA</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LVT</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">K6U</subfield><subfield code="d">UKAHL</subfield><subfield code="d">RDF</subfield><subfield code="d">SNU</subfield><subfield code="d">VLY</subfield><subfield code="d">BRF</subfield><subfield code="d">EYM</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">966372826</subfield><subfield code="a">1060197336</subfield><subfield code="a">1100957411</subfield><subfield code="a">1162439283</subfield><subfield code="a">1179662446</subfield><subfield code="a">1194741139</subfield><subfield code="a">1241771245</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849285841</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849285845</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1849285837</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781849285834</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)888035953</subfield><subfield code="z">(OCoLC)966372826</subfield><subfield code="z">(OCoLC)1060197336</subfield><subfield code="z">(OCoLC)1100957411</subfield><subfield code="z">(OCoLC)1162439283</subfield><subfield code="z">(OCoLC)1179662446</subfield><subfield code="z">(OCoLC)1194741139</subfield><subfield code="z">(OCoLC)1241771245</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000466</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/ctt7z4pbd</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Krausz, Michael.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2011004375</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security breaches :</subfield><subfield code="b">avoidance treatment based on ISO27001 /</subfield><subfield code="c">Michael Krausz.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Ely, Cambridgeshire, UK :</subfield><subfield code="b">IT Governance Press,</subfield><subfield code="c">©2014.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from title page (Safari, viewed August 9, 2014).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book helps you to manage a security breach by detailing what to do as soon as you discover a breach. Be prepared, be prompt, be decisive. When your organisation's security is compromised, you cannot afford to waste time deciding how to resolve the issue. Updated to cover ISO27001:2013, this second edition gives you clear guidance on how to treat an information security breach and tells you the plans and procedures you have to put in place to minimise damage and return to business as usual. A recovery plan will help you to: recover, and resume normal operations, more quickly; preserve customer confidence by quickly resolving service disruption; secure evidence to help with any criminal investigation and improve your chances of catching those responsible. Read this guide and find out how to manage in the face of a data breach. --</subfield><subfield code="c">Edited summary from book.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Title; Copyright; Contents; Introduction; Chapter 1: What constitutes a breach?; Chapter 2: Treatment using ISO27001; Assess the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft the report; Final decision; Follow up with tenacity; Review; How ISO27001 supports the treatment of breaches; Chapter 3: Case studies; Case study 1 -- small company; Case study 2 -- small company; Case study 3 -- medium-sized company; Case study 4 -- large company; ITG Resources</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2013002597</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Piratage informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hacking</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic book.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Information security breaches (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGkXTKrKyhxpX68yBjkXYd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="z">1849285837</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=838731</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH28339360</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00069070</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1778763</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">838731</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12023457</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic book. |
genre_facet | Electronic book. |
id | ZDB-4-EBA-ocn888035953 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:26:09Z |
institution | BVB |
isbn | 9781849285841 1849285845 |
language | English |
oclc_num | 888035953 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (1 volume) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | IT Governance Press, |
record_format | marc |
spelling | Krausz, Michael. http://id.loc.gov/authorities/names/no2011004375 Information security breaches : avoidance treatment based on ISO27001 / Michael Krausz. 2nd ed. Ely, Cambridgeshire, UK : IT Governance Press, ©2014. 1 online resource (1 volume) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier text file Online resource; title from title page (Safari, viewed August 9, 2014). This book helps you to manage a security breach by detailing what to do as soon as you discover a breach. Be prepared, be prompt, be decisive. When your organisation's security is compromised, you cannot afford to waste time deciding how to resolve the issue. Updated to cover ISO27001:2013, this second edition gives you clear guidance on how to treat an information security breach and tells you the plans and procedures you have to put in place to minimise damage and return to business as usual. A recovery plan will help you to: recover, and resume normal operations, more quickly; preserve customer confidence by quickly resolving service disruption; secure evidence to help with any criminal investigation and improve your chances of catching those responsible. Read this guide and find out how to manage in the face of a data breach. -- Edited summary from book. Includes bibliographical references. Cover; Title; Copyright; Contents; Introduction; Chapter 1: What constitutes a breach?; Chapter 2: Treatment using ISO27001; Assess the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft the report; Final decision; Follow up with tenacity; Review; How ISO27001 supports the treatment of breaches; Chapter 3: Case studies; Case study 1 -- small company; Case study 2 -- small company; Case study 3 -- medium-sized company; Case study 4 -- large company; ITG Resources English. Computer security. Hacking. http://id.loc.gov/authorities/subjects/sh2013002597 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Piratage informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Hacking fast Electronic book. has work: Information security breaches (Text) https://id.oclc.org/worldcat/entity/E39PCGkXTKrKyhxpX68yBjkXYd https://id.oclc.org/worldcat/ontology/hasWork 1849285837 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=838731 Volltext |
spellingShingle | Krausz, Michael Information security breaches : avoidance treatment based on ISO27001 / Cover; Title; Copyright; Contents; Introduction; Chapter 1: What constitutes a breach?; Chapter 2: Treatment using ISO27001; Assess the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft the report; Final decision; Follow up with tenacity; Review; How ISO27001 supports the treatment of breaches; Chapter 3: Case studies; Case study 1 -- small company; Case study 2 -- small company; Case study 3 -- medium-sized company; Case study 4 -- large company; ITG Resources Computer security. Hacking. http://id.loc.gov/authorities/subjects/sh2013002597 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Piratage informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Hacking fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2013002597 http://id.loc.gov/authorities/subjects/sh94001277 https://id.nlm.nih.gov/mesh/D016494 |
title | Information security breaches : avoidance treatment based on ISO27001 / |
title_auth | Information security breaches : avoidance treatment based on ISO27001 / |
title_exact_search | Information security breaches : avoidance treatment based on ISO27001 / |
title_full | Information security breaches : avoidance treatment based on ISO27001 / Michael Krausz. |
title_fullStr | Information security breaches : avoidance treatment based on ISO27001 / Michael Krausz. |
title_full_unstemmed | Information security breaches : avoidance treatment based on ISO27001 / Michael Krausz. |
title_short | Information security breaches : |
title_sort | information security breaches avoidance treatment based on iso27001 |
title_sub | avoidance treatment based on ISO27001 / |
topic | Computer security. Hacking. http://id.loc.gov/authorities/subjects/sh2013002597 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Piratage informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Hacking fast |
topic_facet | Computer security. Hacking. Computer networks Security measures. Computer Security Sécurité informatique. Piratage informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Security General. Computer networks Security measures Computer security Hacking Electronic book. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=838731 |
work_keys_str_mv | AT krauszmichael informationsecuritybreachesavoidancetreatmentbasedoniso27001 |