Nine steps to success :: an ISO 27001:2013 implementation overview /
Providing a comprehensive overview of how to lead a successful ISO27001-compliant ISMS implementation in just nine steps, this no-nonsense guide is ideal for anyone tackling ISO27001 for the first time, and covers each element of the ISO27001 project in simple, non-technical language.--
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely, Cambridgeshire, United Kingdom :
IT Governance Publishing,
[2016]
|
Ausgabe: | Third edition. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Providing a comprehensive overview of how to lead a successful ISO27001-compliant ISMS implementation in just nine steps, this no-nonsense guide is ideal for anyone tackling ISO27001 for the first time, and covers each element of the ISO27001 project in simple, non-technical language.-- |
Beschreibung: | 1 online resource (128 pages) |
ISBN: | 9781849288248 1849288240 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn949716876 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 160512t20162016enk o 000 0 eng d | ||
040 | |a JSTOR |b eng |e rda |e pn |c JSTOR |d OCLCO |d UMI |d N$T |d YDXCP |d EBLCP |d OCLCO |d UAB |d COO |d IDB |d K6U |d OTZ |d LIV |d MERUC |d OCLCQ |d IOG |d OCLCA |d SNK |d DKU |d BTN |d IGB |d D6H |d WAU |d VVB |d VTS |d AGLDB |d G3B |d S8J |d S9I |d STF |d AU@ |d OCLCQ |d VT2 |d OCLCO |d OCLCQ |d BRF |d UX1 |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d DEGRU | ||
019 | |a 949326961 |a 949883745 |a 949908719 |a 965548111 |a 966385738 |a 1102386762 |a 1175630555 |a 1259163617 | ||
020 | |a 9781849288248 |q (electronic book) | ||
020 | |a 1849288240 |q (electronic book) | ||
020 | |z 9781849288231 |q (paper) | ||
020 | |z 1849288232 |q (paper) | ||
020 | |z 9781849288255 | ||
024 | 8 | |a 9781849288255 | |
035 | |a (OCoLC)949716876 |z (OCoLC)949326961 |z (OCoLC)949883745 |z (OCoLC)949908719 |z (OCoLC)965548111 |z (OCoLC)966385738 |z (OCoLC)1102386762 |z (OCoLC)1175630555 |z (OCoLC)1259163617 | ||
037 | |a 22573/ctt1bkhpf6 |b JSTOR | ||
050 | 4 | |a HF5548.37 |b .C352 2016eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Calder, Alan, |d 1957- |e author. |1 https://id.oclc.org/worldcat/entity/E39PCjFk9VbdBGPWpx6MgTCHhb |0 http://id.loc.gov/authorities/names/nb2002066406 | |
245 | 1 | 0 | |a Nine steps to success : |b an ISO 27001:2013 implementation overview / |c Alan Calder. |
250 | |a Third edition. | ||
264 | 1 | |a Ely, Cambridgeshire, United Kingdom : |b IT Governance Publishing, |c [2016] | |
264 | 4 | |c ©2016 | |
300 | |a 1 online resource (128 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
505 | 0 | |a Introduction -- 1. Project Mandate -- 2. Project Initiation -- 3. ISMS Initiation -- 4. Management Framework -- 5. Baseline Security Criteria -- 6. Risk Management -- 7. Implementation -- 8. Measure, Monitor and Review -- 9. Certification -- ISO 27001 Resources -- ITG resources. | |
520 | |a Providing a comprehensive overview of how to lead a successful ISO27001-compliant ISMS implementation in just nine steps, this no-nonsense guide is ideal for anyone tackling ISO27001 for the first time, and covers each element of the ISO27001 project in simple, non-technical language.-- |c Edited summary from book. | ||
588 | 0 | |a Print version record. | |
542 | |f Copyright © IT Governance Publishing |g 2016 | ||
650 | 0 | |a Computer security |x Management. | |
650 | 0 | |a Computer security |x Standards. |0 http://id.loc.gov/authorities/subjects/sh99004226 | |
650 | 0 | |a Data protection |x Standards. | |
650 | 6 | |a Sécurité informatique |x Gestion. | |
650 | 6 | |a Sécurité informatique |x Normes. | |
650 | 6 | |a Protection de l'information (Informatique) |v Normes. | |
650 | 6 | |a Protection de l'information (Informatique) |x Normes. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |x Management |2 fast | |
650 | 7 | |a Computer security |x Standards |2 fast | |
650 | 7 | |a Data protection |x Standards |2 fast | |
758 | |i has work: |a Nine steps to success (Text) |1 https://id.oclc.org/worldcat/entity/E39PCG3B33CrVY9x3DWjFTcyr3 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Nine steps to success. |b Third edition. |d Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, [2016] |z 9781849288231 |w (OCoLC)984699702 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1232541 |3 Volltext |
938 | |a De Gruyter |b DEGR |n 9781849288248 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL4519667 | ||
938 | |a EBSCOhost |b EBSC |n 1232541 | ||
938 | |a YBP Library Services |b YANK |n 12979485 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn949716876 |
---|---|
_version_ | 1816882349040730112 |
adam_text | |
any_adam_object | |
author | Calder, Alan, 1957- |
author_GND | http://id.loc.gov/authorities/names/nb2002066406 |
author_facet | Calder, Alan, 1957- |
author_role | aut |
author_sort | Calder, Alan, 1957- |
author_variant | a c ac |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HF5548 |
callnumber-raw | HF5548.37 .C352 2016eb |
callnumber-search | HF5548.37 .C352 2016eb |
callnumber-sort | HF 45548.37 C352 42016EB |
callnumber-subject | HF - Commerce |
collection | ZDB-4-EBA |
contents | Introduction -- 1. Project Mandate -- 2. Project Initiation -- 3. ISMS Initiation -- 4. Management Framework -- 5. Baseline Security Criteria -- 6. Risk Management -- 7. Implementation -- 8. Measure, Monitor and Review -- 9. Certification -- ISO 27001 Resources -- ITG resources. |
ctrlnum | (OCoLC)949716876 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Third edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03981cam a2200709 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn949716876</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">160512t20162016enk o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">JSTOR</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">JSTOR</subfield><subfield code="d">OCLCO</subfield><subfield code="d">UMI</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCO</subfield><subfield code="d">UAB</subfield><subfield code="d">COO</subfield><subfield code="d">IDB</subfield><subfield code="d">K6U</subfield><subfield code="d">OTZ</subfield><subfield code="d">LIV</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IOG</subfield><subfield code="d">OCLCA</subfield><subfield code="d">SNK</subfield><subfield code="d">DKU</subfield><subfield code="d">BTN</subfield><subfield code="d">IGB</subfield><subfield code="d">D6H</subfield><subfield code="d">WAU</subfield><subfield code="d">VVB</subfield><subfield code="d">VTS</subfield><subfield code="d">AGLDB</subfield><subfield code="d">G3B</subfield><subfield code="d">S8J</subfield><subfield code="d">S9I</subfield><subfield code="d">STF</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">BRF</subfield><subfield code="d">UX1</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">DEGRU</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">949326961</subfield><subfield code="a">949883745</subfield><subfield code="a">949908719</subfield><subfield code="a">965548111</subfield><subfield code="a">966385738</subfield><subfield code="a">1102386762</subfield><subfield code="a">1175630555</subfield><subfield code="a">1259163617</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849288248</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849288240</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781849288231</subfield><subfield code="q">(paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1849288232</subfield><subfield code="q">(paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781849288255</subfield></datafield><datafield tag="024" ind1="8" ind2=" "><subfield code="a">9781849288255</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)949716876</subfield><subfield code="z">(OCoLC)949326961</subfield><subfield code="z">(OCoLC)949883745</subfield><subfield code="z">(OCoLC)949908719</subfield><subfield code="z">(OCoLC)965548111</subfield><subfield code="z">(OCoLC)966385738</subfield><subfield code="z">(OCoLC)1102386762</subfield><subfield code="z">(OCoLC)1175630555</subfield><subfield code="z">(OCoLC)1259163617</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/ctt1bkhpf6</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HF5548.37</subfield><subfield code="b">.C352 2016eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Calder, Alan,</subfield><subfield code="d">1957-</subfield><subfield code="e">author.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjFk9VbdBGPWpx6MgTCHhb</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2002066406</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Nine steps to success :</subfield><subfield code="b">an ISO 27001:2013 implementation overview /</subfield><subfield code="c">Alan Calder.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Third edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely, Cambridgeshire, United Kingdom :</subfield><subfield code="b">IT Governance Publishing,</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (128 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction -- 1. Project Mandate -- 2. Project Initiation -- 3. ISMS Initiation -- 4. Management Framework -- 5. Baseline Security Criteria -- 6. Risk Management -- 7. Implementation -- 8. Measure, Monitor and Review -- 9. Certification -- ISO 27001 Resources -- ITG resources.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Providing a comprehensive overview of how to lead a successful ISO27001-compliant ISMS implementation in just nine steps, this no-nonsense guide is ideal for anyone tackling ISO27001 for the first time, and covers each element of the ISO27001 project in simple, non-technical language.--</subfield><subfield code="c">Edited summary from book.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="542" ind1=" " ind2=" "><subfield code="f">Copyright © IT Governance Publishing</subfield><subfield code="g">2016</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Standards.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh99004226</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield><subfield code="x">Standards.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="x">Gestion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="x">Normes.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield><subfield code="v">Normes.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield><subfield code="x">Normes.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="x">Standards</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="x">Standards</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Nine steps to success (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCG3B33CrVY9x3DWjFTcyr3</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Nine steps to success.</subfield><subfield code="b">Third edition.</subfield><subfield code="d">Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, [2016]</subfield><subfield code="z">9781849288231</subfield><subfield code="w">(OCoLC)984699702</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1232541</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">De Gruyter</subfield><subfield code="b">DEGR</subfield><subfield code="n">9781849288248</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL4519667</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1232541</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12979485</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn949716876 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:27:12Z |
institution | BVB |
isbn | 9781849288248 1849288240 |
language | English |
oclc_num | 949716876 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (128 pages) |
psigel | ZDB-4-EBA |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | IT Governance Publishing, |
record_format | marc |
spelling | Calder, Alan, 1957- author. https://id.oclc.org/worldcat/entity/E39PCjFk9VbdBGPWpx6MgTCHhb http://id.loc.gov/authorities/names/nb2002066406 Nine steps to success : an ISO 27001:2013 implementation overview / Alan Calder. Third edition. Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, [2016] ©2016 1 online resource (128 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file Introduction -- 1. Project Mandate -- 2. Project Initiation -- 3. ISMS Initiation -- 4. Management Framework -- 5. Baseline Security Criteria -- 6. Risk Management -- 7. Implementation -- 8. Measure, Monitor and Review -- 9. Certification -- ISO 27001 Resources -- ITG resources. Providing a comprehensive overview of how to lead a successful ISO27001-compliant ISMS implementation in just nine steps, this no-nonsense guide is ideal for anyone tackling ISO27001 for the first time, and covers each element of the ISO27001 project in simple, non-technical language.-- Edited summary from book. Print version record. Copyright © IT Governance Publishing 2016 Computer security Management. Computer security Standards. http://id.loc.gov/authorities/subjects/sh99004226 Data protection Standards. Sécurité informatique Gestion. Sécurité informatique Normes. Protection de l'information (Informatique) Normes. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security Management fast Computer security Standards fast Data protection Standards fast has work: Nine steps to success (Text) https://id.oclc.org/worldcat/entity/E39PCG3B33CrVY9x3DWjFTcyr3 https://id.oclc.org/worldcat/ontology/hasWork Print version: Nine steps to success. Third edition. Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, [2016] 9781849288231 (OCoLC)984699702 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1232541 Volltext |
spellingShingle | Calder, Alan, 1957- Nine steps to success : an ISO 27001:2013 implementation overview / Introduction -- 1. Project Mandate -- 2. Project Initiation -- 3. ISMS Initiation -- 4. Management Framework -- 5. Baseline Security Criteria -- 6. Risk Management -- 7. Implementation -- 8. Measure, Monitor and Review -- 9. Certification -- ISO 27001 Resources -- ITG resources. Computer security Management. Computer security Standards. http://id.loc.gov/authorities/subjects/sh99004226 Data protection Standards. Sécurité informatique Gestion. Sécurité informatique Normes. Protection de l'information (Informatique) Normes. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security Management fast Computer security Standards fast Data protection Standards fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh99004226 |
title | Nine steps to success : an ISO 27001:2013 implementation overview / |
title_auth | Nine steps to success : an ISO 27001:2013 implementation overview / |
title_exact_search | Nine steps to success : an ISO 27001:2013 implementation overview / |
title_full | Nine steps to success : an ISO 27001:2013 implementation overview / Alan Calder. |
title_fullStr | Nine steps to success : an ISO 27001:2013 implementation overview / Alan Calder. |
title_full_unstemmed | Nine steps to success : an ISO 27001:2013 implementation overview / Alan Calder. |
title_short | Nine steps to success : |
title_sort | nine steps to success an iso 27001 2013 implementation overview |
title_sub | an ISO 27001:2013 implementation overview / |
topic | Computer security Management. Computer security Standards. http://id.loc.gov/authorities/subjects/sh99004226 Data protection Standards. Sécurité informatique Gestion. Sécurité informatique Normes. Protection de l'information (Informatique) Normes. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security Management fast Computer security Standards fast Data protection Standards fast |
topic_facet | Computer security Management. Computer security Standards. Data protection Standards. Sécurité informatique Gestion. Sécurité informatique Normes. Protection de l'information (Informatique) Normes. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer security Management Computer security Standards Data protection Standards |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1232541 |
work_keys_str_mv | AT calderalan ninestepstosuccessaniso270012013implementationoverview |