Information Security Breaches: Avoidance and Treatment based on ISO27001
This pocket guide outlines a process and its elements for the treatment of severe breaches, and places them in the context of the associated ISO27001 controls. Firslty it offers a general discussion of what information security breaches are, and secondly it helps rform a first line of defence for th...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Ely
IT Governance Pub.
2009
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781849280273/?ar |
Zusammenfassung: | This pocket guide outlines a process and its elements for the treatment of severe breaches, and places them in the context of the associated ISO27001 controls. Firslty it offers a general discussion of what information security breaches are, and secondly it helps rform a first line of defence for the reader who is the victim of an incident and is looking for guidance and direction. |
Beschreibung: | Includes bibliographical references. - Print version record |
Umfang: | 1 Online-Ressource (56 Seiten) |
ISBN: | 9781849280280 1849280282 9781849280273 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047740965 | ||
003 | DE-627-1 | ||
005 | 20250227110748.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2009 xx |||||o 00| ||eng c | ||
020 | |a 9781849280280 |c electronic bk. |9 978-1-84928-028-0 | ||
020 | |a 1849280282 |c electronic bk. |9 1-84928-028-2 | ||
020 | |a 9781849280273 |9 978-1-84928-027-3 | ||
035 | |a (DE-627-1)047740965 | ||
035 | |a (DE-599)KEP047740965 | ||
035 | |a (ORHE)9781849280273 | ||
035 | |a (DE-627-1)047740965 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a UTN, UBL, UR |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Krausz, Michael |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Information Security Breaches |b Avoidance and Treatment based on ISO27001 |
264 | 1 | |a Ely |b IT Governance Pub. |c 2009 | |
300 | |a 1 Online-Ressource (56 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references. - Print version record | ||
520 | |a This pocket guide outlines a process and its elements for the treatment of severe breaches, and places them in the context of the associated ISO27001 controls. Firslty it offers a general discussion of what information security breaches are, and secondly it helps rform a first line of defence for the reader who is the victim of an incident and is looking for guidance and direction. | ||
650 | 0 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 0 | |a Computer security |x Management |x Standards | |
650 | 0 | |a Data protection |x Management |x Standards | |
650 | 4 | |a Sécurité informatique ; Gestion ; Normes | |
650 | 4 | |a Protection de l'information (Informatique) ; Gestion ; Normes | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Business enterprises ; Computer networks ; Security measures | |
776 | 1 | |z 9781849280273 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781849280273 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781849280273/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047740965 |
---|---|
_version_ | 1829007769032720384 |
adam_text | |
any_adam_object | |
author | Krausz, Michael |
author_facet | Krausz, Michael |
author_role | aut |
author_sort | Krausz, Michael |
author_variant | m k mk |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047740965 (DE-599)KEP047740965 (ORHE)9781849280273 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02412cam a22005532c 4500</leader><controlfield tag="001">ZDB-30-ORH-047740965</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20250227110748.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2009 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280280</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-84928-028-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280282</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-84928-028-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280273</subfield><subfield code="9">978-1-84928-027-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047740965</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047740965</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781849280273</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047740965</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UTN, UBL, UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Krausz, Michael</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information Security Breaches</subfield><subfield code="b">Avoidance and Treatment based on ISO27001</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (56 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This pocket guide outlines a process and its elements for the treatment of severe breaches, and places them in the context of the associated ISO27001 controls. Firslty it offers a general discussion of what information security breaches are, and secondly it helps rform a first line of defence for the reader who is the victim of an incident and is looking for guidance and direction.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="x">Standards</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield><subfield code="x">Management</subfield><subfield code="x">Standards</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Gestion ; Normes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique) ; Gestion ; Normes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises ; Computer networks ; Security measures</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781849280273</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781849280273</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781849280273/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047740965 |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:35:33Z |
institution | BVB |
isbn | 9781849280280 1849280282 9781849280273 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (56 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Krausz, Michael VerfasserIn aut Information Security Breaches Avoidance and Treatment based on ISO27001 Ely IT Governance Pub. 2009 1 Online-Ressource (56 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references. - Print version record This pocket guide outlines a process and its elements for the treatment of severe breaches, and places them in the context of the associated ISO27001 controls. Firslty it offers a general discussion of what information security breaches are, and secondly it helps rform a first line of defence for the reader who is the victim of an incident and is looking for guidance and direction. Business enterprises Computer networks Security measures Computer security Management Standards Data protection Management Standards Sécurité informatique ; Gestion ; Normes Protection de l'information (Informatique) ; Gestion ; Normes COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Business enterprises ; Computer networks ; Security measures 9781849280273 Erscheint auch als Druck-Ausgabe 9781849280273 |
spellingShingle | Krausz, Michael Information Security Breaches Avoidance and Treatment based on ISO27001 Business enterprises Computer networks Security measures Computer security Management Standards Data protection Management Standards Sécurité informatique ; Gestion ; Normes Protection de l'information (Informatique) ; Gestion ; Normes COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Business enterprises ; Computer networks ; Security measures |
title | Information Security Breaches Avoidance and Treatment based on ISO27001 |
title_auth | Information Security Breaches Avoidance and Treatment based on ISO27001 |
title_exact_search | Information Security Breaches Avoidance and Treatment based on ISO27001 |
title_full | Information Security Breaches Avoidance and Treatment based on ISO27001 |
title_fullStr | Information Security Breaches Avoidance and Treatment based on ISO27001 |
title_full_unstemmed | Information Security Breaches Avoidance and Treatment based on ISO27001 |
title_short | Information Security Breaches |
title_sort | information security breaches avoidance and treatment based on iso27001 |
title_sub | Avoidance and Treatment based on ISO27001 |
topic | Business enterprises Computer networks Security measures Computer security Management Standards Data protection Management Standards Sécurité informatique ; Gestion ; Normes Protection de l'information (Informatique) ; Gestion ; Normes COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Business enterprises ; Computer networks ; Security measures |
topic_facet | Business enterprises Computer networks Security measures Computer security Management Standards Data protection Management Standards Sécurité informatique ; Gestion ; Normes Protection de l'information (Informatique) ; Gestion ; Normes COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Business enterprises ; Computer networks ; Security measures |
work_keys_str_mv | AT krauszmichael informationsecuritybreachesavoidanceandtreatmentbasedoniso27001 |