The case for ISO27001 :: 2013 /
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
United Kingdom :
IT Governance Publishing,
2013.
|
Ausgabe: | Second edition. |
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | 1 online resource (110 pages) |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9781849285315 1849285314 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBU-ocn876049154 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 140408s2013 xxu ob 000 0 eng d | ||
040 | |a JSTOR |b eng |e rda |e pn |c JSTOR |d SFB |d OCLCO |d COO |d E7B |d YDXCP |d N$T |d OCLCO |d EBLCP |d DEBSZ |d N$T |d OCLCO |d AGLDB |d MERUC |d IOG |d OCLCA |d OCLCF |d OCLCQ |d OCLCO |d LVT |d STF |d UKAHL |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d WAU |d OCLCQ |d SXB | ||
019 | |a 900741923 | ||
020 | |a 9781849285315 |q (electronic bk.) | ||
020 | |a 1849285314 |q (electronic bk.) | ||
020 | |z 9781849285308 | ||
020 | |z 1849285306 | ||
035 | |a (OCoLC)876049154 |z (OCoLC)900741923 | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Calder, Alan, |d 1957- |1 https://id.oclc.org/worldcat/entity/E39PCjFk9VbdBGPWpx6MgTCHhb |0 http://id.loc.gov/authorities/names/nb2002066406 | |
245 | 1 | 4 | |a The case for ISO27001 : |b 2013 / |c Alan Calder. |
250 | |a Second edition. | ||
264 | 1 | |a United Kingdom : |b IT Governance Publishing, |c 2013. | |
300 | |a 1 online resource (110 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Online resource; title from PDF title page (JSTOR, viewed March 21, 2014). | |
504 | |a Includes bibliographical references. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Business enterprises |x Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh95010367 | |
650 | 0 | |a Computer security |x Management |x Standards. | |
650 | 0 | |a Data protection |x Management |x Standards. | |
650 | 0 | |a Confidential business information. |0 http://id.loc.gov/authorities/subjects/sh2002009896 | |
650 | 0 | |a Cyberterrorism. |0 http://id.loc.gov/authorities/subjects/sh00001974 | |
650 | 6 | |a Sécurité informatique |x Gestion |x Normes. | |
650 | 6 | |a Protection de l'information (Informatique) |v Gestion |v Normes. | |
650 | 6 | |a Renseignements commerciaux confidentiels. | |
650 | 6 | |a Cyberterrorisme. | |
650 | 6 | |a Protection de l'information (Informatique) |x Gestion |x Normes. | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Business enterprises |x Computer networks |x Security measures |2 fast | |
650 | 7 | |a Confidential business information |2 fast | |
650 | 7 | |a Cyberterrorism |2 fast | |
655 | 4 | |a Electronic book. | |
758 | |i has work: |a The case for ISO27001 (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGbj83XJT8d9TG3DVdwHmd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Calder, Alan, 1957- |t Case for ISO27001 : 2013. |b Second edition |z 9781849285315 |w (OCoLC)864095751 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBU |q FWS_PDA_EBU |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=838720 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH26135096 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL3015816 | ||
938 | |a ebrary |b EBRY |n ebr10904541 | ||
938 | |a EBSCOhost |b EBSC |n 838720 | ||
938 | |a YBP Library Services |b YANK |n 11821794 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBU | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBU-ocn876049154 |
---|---|
_version_ | 1816796912993435648 |
adam_text | |
any_adam_object | |
author | Calder, Alan, 1957- |
author_GND | http://id.loc.gov/authorities/names/nb2002066406 |
author_facet | Calder, Alan, 1957- |
author_role | |
author_sort | Calder, Alan, 1957- |
author_variant | a c ac |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBU |
ctrlnum | (OCoLC)876049154 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03203cam a2200673 i 4500</leader><controlfield tag="001">ZDB-4-EBU-ocn876049154</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">140408s2013 xxu ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">JSTOR</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">JSTOR</subfield><subfield code="d">SFB</subfield><subfield code="d">OCLCO</subfield><subfield code="d">COO</subfield><subfield code="d">E7B</subfield><subfield code="d">YDXCP</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCO</subfield><subfield code="d">EBLCP</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MERUC</subfield><subfield code="d">IOG</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">LVT</subfield><subfield code="d">STF</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">WAU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SXB</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">900741923</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849285315</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849285314</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781849285308</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1849285306</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)876049154</subfield><subfield code="z">(OCoLC)900741923</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Calder, Alan,</subfield><subfield code="d">1957-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjFk9VbdBGPWpx6MgTCHhb</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2002066406</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The case for ISO27001 :</subfield><subfield code="b">2013 /</subfield><subfield code="c">Alan Calder.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">United Kingdom :</subfield><subfield code="b">IT Governance Publishing,</subfield><subfield code="c">2013.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (110 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from PDF title page (JSTOR, viewed March 21, 2014).</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh95010367</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="x">Standards.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield><subfield code="x">Management</subfield><subfield code="x">Standards.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Confidential business information.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2002009896</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh00001974</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="x">Gestion</subfield><subfield code="x">Normes.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield><subfield code="v">Gestion</subfield><subfield code="v">Normes.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Renseignements commerciaux confidentiels.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cyberterrorisme.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield><subfield code="x">Gestion</subfield><subfield code="x">Normes.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Confidential business information</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic book.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">The case for ISO27001 (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGbj83XJT8d9TG3DVdwHmd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Calder, Alan, 1957-</subfield><subfield code="t">Case for ISO27001 : 2013.</subfield><subfield code="b">Second edition</subfield><subfield code="z">9781849285315</subfield><subfield code="w">(OCoLC)864095751</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FWS_PDA_EBU</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=838720</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH26135096</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL3015816</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10904541</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">838720</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">11821794</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic book. |
genre_facet | Electronic book. |
id | ZDB-4-EBU-ocn876049154 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:49:13Z |
institution | BVB |
isbn | 9781849285315 1849285314 |
language | English |
oclc_num | 876049154 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (110 pages) |
psigel | ZDB-4-EBU |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | IT Governance Publishing, |
record_format | marc |
spelling | Calder, Alan, 1957- https://id.oclc.org/worldcat/entity/E39PCjFk9VbdBGPWpx6MgTCHhb http://id.loc.gov/authorities/names/nb2002066406 The case for ISO27001 : 2013 / Alan Calder. Second edition. United Kingdom : IT Governance Publishing, 2013. 1 online resource (110 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Online resource; title from PDF title page (JSTOR, viewed March 21, 2014). Includes bibliographical references. Print version record. Business enterprises Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh95010367 Computer security Management Standards. Data protection Management Standards. Confidential business information. http://id.loc.gov/authorities/subjects/sh2002009896 Cyberterrorism. http://id.loc.gov/authorities/subjects/sh00001974 Sécurité informatique Gestion Normes. Protection de l'information (Informatique) Gestion Normes. Renseignements commerciaux confidentiels. Cyberterrorisme. COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Business enterprises Computer networks Security measures fast Confidential business information fast Cyberterrorism fast Electronic book. has work: The case for ISO27001 (Text) https://id.oclc.org/worldcat/entity/E39PCGbj83XJT8d9TG3DVdwHmd https://id.oclc.org/worldcat/ontology/hasWork Print version: Calder, Alan, 1957- Case for ISO27001 : 2013. Second edition 9781849285315 (OCoLC)864095751 FWS01 ZDB-4-EBU FWS_PDA_EBU https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=838720 Volltext |
spellingShingle | Calder, Alan, 1957- The case for ISO27001 : 2013 / Business enterprises Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh95010367 Computer security Management Standards. Data protection Management Standards. Confidential business information. http://id.loc.gov/authorities/subjects/sh2002009896 Cyberterrorism. http://id.loc.gov/authorities/subjects/sh00001974 Sécurité informatique Gestion Normes. Protection de l'information (Informatique) Gestion Normes. Renseignements commerciaux confidentiels. Cyberterrorisme. COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Business enterprises Computer networks Security measures fast Confidential business information fast Cyberterrorism fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh95010367 http://id.loc.gov/authorities/subjects/sh2002009896 http://id.loc.gov/authorities/subjects/sh00001974 |
title | The case for ISO27001 : 2013 / |
title_auth | The case for ISO27001 : 2013 / |
title_exact_search | The case for ISO27001 : 2013 / |
title_full | The case for ISO27001 : 2013 / Alan Calder. |
title_fullStr | The case for ISO27001 : 2013 / Alan Calder. |
title_full_unstemmed | The case for ISO27001 : 2013 / Alan Calder. |
title_short | The case for ISO27001 : |
title_sort | case for iso27001 2013 |
title_sub | 2013 / |
topic | Business enterprises Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh95010367 Computer security Management Standards. Data protection Management Standards. Confidential business information. http://id.loc.gov/authorities/subjects/sh2002009896 Cyberterrorism. http://id.loc.gov/authorities/subjects/sh00001974 Sécurité informatique Gestion Normes. Protection de l'information (Informatique) Gestion Normes. Renseignements commerciaux confidentiels. Cyberterrorisme. COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Business enterprises Computer networks Security measures fast Confidential business information fast Cyberterrorism fast |
topic_facet | Business enterprises Computer networks Security measures. Computer security Management Standards. Data protection Management Standards. Confidential business information. Cyberterrorism. Sécurité informatique Gestion Normes. Protection de l'information (Informatique) Gestion Normes. Renseignements commerciaux confidentiels. Cyberterrorisme. COMPUTERS Networking Security. COMPUTERS Security General. Business enterprises Computer networks Security measures Confidential business information Cyberterrorism Electronic book. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=838720 |
work_keys_str_mv | AT calderalan thecaseforiso270012013 AT calderalan caseforiso270012013 |