LDR | | 03543cmm u22005771i 4500 |
001 | | 000000315940 |
003 | | OCoLC |
005 | | 20230525175444 |
006 | | m d |
007 | | cr cnu---unuuu |
008 | | 190607s2020 enk ob 001 0 eng d |
015 | |
▼a GBB9D6769
▼2 bnb |
016 | 7 |
▼a 019497580
▼2 Uk |
020 | |
▼a 9780749496968
▼q electronic book |
020 | |
▼a 0749496967
▼q electronic book |
020 | |
▼z 9781789660302
▼q hardcover |
020 | |
▼z 9780749496951
▼q paperback |
035 | |
▼a 2258715
▼b (N$T) |
035 | |
▼a (OCoLC)1122169287 |
037 | |
▼a KoganPage11027
▼b Ingram Content Group |
040 | |
▼a UKMGB
▼b eng
▼e rda
▼e pn
▼c UKMGB
▼d OCLCO
▼d OCLCF
▼d EBLCP
▼d N$T
▼d UKAHL
▼d YDXIT
▼d 248032 |
049 | |
▼a MAIN |
050 | 4 |
▼a QA76.9.A25
▼b C35 2020 |
082 | 04 |
▼a 005.8
▼2 23 |
082 | 04 |
▼a 658.0558
▼2 23 |
100 | 1 |
▼a Calder, Alan,
▼d 1957-,
▼e author. |
245 | 10 |
▼a IT governance :
▼b an international guide to data security and ISO27001/ISO 27002 /
▼c Alan Calder, Steve Watkins. |
250 | |
▼a Seventh edition. |
260 | |
▼a London ;
▼a New York, NY :
▼b Kogan Page,
▼c 2020. |
300 | |
▼a 1 online resource (x, 395 pages) |
336 | |
▼a text
▼b txt
▼2 rdacontent |
337 | |
▼a computer
▼b c
▼2 rdamedia |
338 | |
▼a online resource
▼b cr
▼2 rdacarrier |
504 | |
▼a Includes bibliographical references and index. |
505 | 0 |
▼a Chapter 01: Why is information security necessary -- Chapter 02: The UK combined code, the FRC risk guidance and Sarbanes-Oxley -- Chapter 03: ISO27001 -- Chapter 04: Organizing information security -- Chapter 05: Information security policy and scope -- Chapter 06: The risk assessment and Statement of Applicability -- Chapter 07: Mobile devices -- Chapter 08: Human resources security -- Chapter 09: Asset management -- Chapter 10: Media handling -- Chapter 11: Access control -- Chapter 12: User access management -- Chapter 13: System and application access control -- Chapter 14: Cryptography -- Chapter 15: Physical and environmental security -- Chapter 16: Equipment security -- Chapter 17: Operations security -- Chapter 18: Controls against malicious software (malware) -- Chapter 19: Communications management -- Chapter 20: Exchanges of information -- Chapter 21: System acquisition, development and maintenance -- Chapter 22: Development and support processes -- Chapter 23: Supplier relationships -- Chapter 24: Monitoring and information security incident management -- Chapter 25: Business and information security continuity management -- Chapter 26: Compliance -- Chapter 27: The ISO27001 audit. |
520 | |
▼a Implement an effective and compliant information security management system using IT governance best practice. |
588 | |
▼a Description based on online resource; title from digital title page (viewed on February 10, 2020). |
590 | |
▼a Master record variable field(s) change: 050, 082, 650 |
650 | 0 |
▼a Data protection. |
650 | 0 |
▼a Computer security. |
650 | 0 |
▼a Business enterprises
▼x Computer networks
▼x Security measures. |
650 | 7 |
▼a Business enterprises
▼x Computer networks
▼x Security measures.
▼2 fast
▼0 (OCoLC)fst00842535 |
650 | 7 |
▼a Data protection.
▼2 fast
▼0 (OCoLC)fst00887958 |
655 | 4 |
▼a Electronic books. |
700 | 1 |
▼a Watkins, Steve,
▼d 1970-,
▼e author. |
776 | 08 |
▼i Print version:
▼z 9781789660302 |
856 | 40 |
▼3 EBSCOhost
▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2258715 |
938 | |
▼a Askews and Holts Library Services
▼b ASKH
▼n AH36195277 |
938 | |
▼a ProQuest Ebook Central
▼b EBLB
▼n EBL5940349 |
938 | |
▼a EBSCOhost
▼b EBSC
▼n 2258715 |
990 | |
▼a 관리자 |
994 | |
▼a 92
▼b N$T |