Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Implementing an information security...
~
Chaudhary, Mukund.
Implementing an information security management systemsecurity management based on ISO 27001 guidelines /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Implementing an information security management systemby Abhishek Chopra, Mukund Chaudhary.
Reminder of title:
security management based on ISO 27001 guidelines /
Author:
Chopra, Abhishek.
other author:
Chaudhary, Mukund.
Published:
Berkeley, CA :Apress :2020.
Description:
xvii, 274 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Computer securityManagement.
Online resource:
https://doi.org/10.1007/978-1-4842-5413-4
ISBN:
9781484254134$q(electronic bk.)
Implementing an information security management systemsecurity management based on ISO 27001 guidelines /
Chopra, Abhishek.
Implementing an information security management system
security management based on ISO 27001 guidelines /[electronic resource] :by Abhishek Chopra, Mukund Chaudhary. - Berkeley, CA :Apress :2020. - xvii, 274 p. :ill., digital ;24 cm.
Chapter 1 - Need for information security -- Chapter 2 - Step 1: Assessing Needs and Scope -- Chapter 3 - Step 2: Project kick-off -- Chapter 4 - Step 3: Initial Risk Assessment -- Chapter 5 - Step 4: Risk Management Approach -- Chapter 6 - Step 5: Execution -- Chapter 7 - Step 6: Audit -- Chapter 8 - Step 7: Management Review -- Chapter 9 - Step 8: External Audit / Assessment -- Chapter 10 - Continual Improvement.
Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You'll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation, post-implementation, and during monitoring of the implemented controls. Implementing an Information Security Management System provides implementation guidelines for ISO 27001:2013 to protect your information assets and ensure a safer enterprise environment. This book is a step-by-step guide on implementing secure ISMS for your organization. It will change the way you interpret and implement information security in your work area or organization. You will: Discover information safeguard methods Implement end-to-end information security Manage risk associated with information security Prepare for audit with associated roles and responsibilities Identify your information risk Protect your information assets.
ISBN: 9781484254134$q(electronic bk.)
Standard No.: 10.1007/978-1-4842-5413-4doiSubjects--Topical Terms:
230939
Computer security
--Management.
LC Class. No.: QA76.9.A25 / C467 2020
Dewey Class. No.: 005.8
Implementing an information security management systemsecurity management based on ISO 27001 guidelines /
LDR
:02500nmm a2200325 a 4500
001
575890
003
DE-He213
005
20200602113053.0
006
m d
007
cr nn 008maaau
008
201027s2020 cau s 0 eng d
020
$a
9781484254134$q(electronic bk.)
020
$a
9781484254127$q(paper)
024
7
$a
10.1007/978-1-4842-5413-4
$2
doi
035
$a
978-1-4842-5413-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
C467 2020
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
C549 2020
100
1
$a
Chopra, Abhishek.
$3
772580
245
1 0
$a
Implementing an information security management system
$h
[electronic resource] :
$b
security management based on ISO 27001 guidelines /
$c
by Abhishek Chopra, Mukund Chaudhary.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2020.
300
$a
xvii, 274 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1 - Need for information security -- Chapter 2 - Step 1: Assessing Needs and Scope -- Chapter 3 - Step 2: Project kick-off -- Chapter 4 - Step 3: Initial Risk Assessment -- Chapter 5 - Step 4: Risk Management Approach -- Chapter 6 - Step 5: Execution -- Chapter 7 - Step 6: Audit -- Chapter 8 - Step 7: Management Review -- Chapter 9 - Step 8: External Audit / Assessment -- Chapter 10 - Continual Improvement.
520
$a
Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You'll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation, post-implementation, and during monitoring of the implemented controls. Implementing an Information Security Management System provides implementation guidelines for ISO 27001:2013 to protect your information assets and ensure a safer enterprise environment. This book is a step-by-step guide on implementing secure ISMS for your organization. It will change the way you interpret and implement information security in your work area or organization. You will: Discover information safeguard methods Implement end-to-end information security Manage risk associated with information security Prepare for audit with associated roles and responsibilities Identify your information risk Protect your information assets.
650
0
$a
Computer security
$x
Management.
$3
230939
650
1 4
$a
Security.
$3
760527
650
2 4
$a
Enterprise Architecture.
$3
724747
650
2 4
$a
Information Storage and Retrieval.
$3
274190
700
1
$a
Chaudhary, Mukund.
$3
728258
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-1-4842-5413-4
950
$a
Professional and Applied Computing (Springer-12059)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000181846
電子館藏
1圖書
電子書
EB QA76.9.A25 C549 2020 2020
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-1-4842-5413-4
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login