MARC보기
LDR03543cmm u22005771i 4500
001000000315940
003OCoLC
00520230525175444
006m d
007cr cnu---unuuu
008190607s2020 enk ob 001 0 eng d
015 ▼a GBB9D6769 ▼2 bnb
0167 ▼a 019497580 ▼2 Uk
020 ▼a 9780749496968 ▼q electronic book
020 ▼a 0749496967 ▼q electronic book
020 ▼z 9781789660302 ▼q hardcover
020 ▼z 9780749496951 ▼q paperback
035 ▼a 2258715 ▼b (N$T)
035 ▼a (OCoLC)1122169287
037 ▼a KoganPage11027 ▼b Ingram Content Group
040 ▼a UKMGB ▼b eng ▼e rda ▼e pn ▼c UKMGB ▼d OCLCO ▼d OCLCF ▼d EBLCP ▼d N$T ▼d UKAHL ▼d YDXIT ▼d 248032
049 ▼a MAIN
050 4 ▼a QA76.9.A25 ▼b C35 2020
08204 ▼a 005.8 ▼2 23
08204 ▼a 658.0558 ▼2 23
1001 ▼a Calder, Alan, ▼d 1957-, ▼e author.
24510 ▼a IT governance : ▼b an international guide to data security and ISO27001/ISO 27002 / ▼c Alan Calder, Steve Watkins.
250 ▼a Seventh edition.
260 ▼a London ; ▼a New York, NY : ▼b Kogan Page, ▼c 2020.
300 ▼a 1 online resource (x, 395 pages)
336 ▼a text ▼b txt ▼2 rdacontent
337 ▼a computer ▼b c ▼2 rdamedia
338 ▼a online resource ▼b cr ▼2 rdacarrier
504 ▼a Includes bibliographical references and index.
5050 ▼a Chapter 01: Why is information security necessary -- Chapter 02: The UK combined code, the FRC risk guidance and Sarbanes-Oxley -- Chapter 03: ISO27001 -- Chapter 04: Organizing information security -- Chapter 05: Information security policy and scope -- Chapter 06: The risk assessment and Statement of Applicability -- Chapter 07: Mobile devices -- Chapter 08: Human resources security -- Chapter 09: Asset management -- Chapter 10: Media handling -- Chapter 11: Access control -- Chapter 12: User access management -- Chapter 13: System and application access control -- Chapter 14: Cryptography -- Chapter 15: Physical and environmental security -- Chapter 16: Equipment security -- Chapter 17: Operations security -- Chapter 18: Controls against malicious software (malware) -- Chapter 19: Communications management -- Chapter 20: Exchanges of information -- Chapter 21: System acquisition, development and maintenance -- Chapter 22: Development and support processes -- Chapter 23: Supplier relationships -- Chapter 24: Monitoring and information security incident management -- Chapter 25: Business and information security continuity management -- Chapter 26: Compliance -- Chapter 27: The ISO27001 audit.
520 ▼a Implement an effective and compliant information security management system using IT governance best practice.
588 ▼a Description based on online resource; title from digital title page (viewed on February 10, 2020).
590 ▼a Master record variable field(s) change: 050, 082, 650
650 0 ▼a Data protection.
650 0 ▼a Computer security.
650 0 ▼a Business enterprises ▼x Computer networks ▼x Security measures.
650 7 ▼a Business enterprises ▼x Computer networks ▼x Security measures. ▼2 fast ▼0 (OCoLC)fst00842535
650 7 ▼a Data protection. ▼2 fast ▼0 (OCoLC)fst00887958
655 4 ▼a Electronic books.
7001 ▼a Watkins, Steve, ▼d 1970-, ▼e author.
77608 ▼i Print version: ▼z 9781789660302
85640 ▼3 EBSCOhost ▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2258715
938 ▼a Askews and Holts Library Services ▼b ASKH ▼n AH36195277
938 ▼a ProQuest Ebook Central ▼b EBLB ▼n EBL5940349
938 ▼a EBSCOhost ▼b EBSC ▼n 2258715
990 ▼a 관리자
994 ▼a 92 ▼b N$T