Implementing an information security management system: (Record no. 3875)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01522nam a22002297a 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20221122124318.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 221122b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781484267677 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Item number | CHO |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Chopra, Abhishek |
245 ## - TITLE STATEMENT | |
Title | Implementing an information security management system: |
Remainder of title | security management based on ISO 27001 guidelines |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Name of publisher, distributor, etc. | Apress |
Place of publication, distribution, etc. | New York |
Date of publication, distribution, etc. | 2021 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xvii, 274 p. |
365 ## - TRADE PRICE | |
Price type code | INR |
Price amount | 999.00 |
520 ## - SUMMARY, ETC. | |
Summary, etc. | About this book<br/>Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation, post-implementation, and during monitoring of the implemented controls. Implementing an Information Security Management System provides implementation guidelines for ISO 27001:2013 to protect your information assets and ensure a safer enterprise environment. <br/><br/>This book is a step-by-step guide on implementing secure ISMS for your organization. It will change the way you interpret and implement information security in your work area or organization. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security--Management |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security--Standards |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data protection--Standards |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Management information systems |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Chaudhary, Mukund |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Book |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Bill No | Bill Date | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total Checkouts | Full call number | Accession Number | Date last seen | Copy number | Cost, replacement price | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | IT & Decisions Sciences | TB1974 | 28-10-2022 | Indian Institute of Management LRC | Indian Institute of Management LRC | General Stacks | 11/22/2022 | Technical Bureau India Pvt. Ltd. | 699.30 | 005.8 CHO | 003716 | 11/22/2022 | 1 | 999.00 | 11/22/2022 | Book |