Information security breaches: avoidance treatment based on ISO27001
This book helps you to manage a security breach by detailing what to do as soon as you discover a breach. Be prepared, be prompt, be decisive. When your organisation's security is compromised, you cannot afford to waste time deciding how to resolve the issue. Updated to cover ISO27001:2013, thi...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Ely, Cambridgeshire, UK
IT Governance Press
2014
|
Ausgabe: | 2nd ed. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781849285841/?ar |
Zusammenfassung: | This book helps you to manage a security breach by detailing what to do as soon as you discover a breach. Be prepared, be prompt, be decisive. When your organisation's security is compromised, you cannot afford to waste time deciding how to resolve the issue. Updated to cover ISO27001:2013, this second edition gives you clear guidance on how to treat an information security breach and tells you the plans and procedures you have to put in place to minimise damage and return to business as usual. A recovery plan will help you to: recover, and resume normal operations, more quickly; preserve customer confidence by quickly resolving service disruption; secure evidence to help with any criminal investigation and improve your chances of catching those responsible. Read this guide and find out how to manage in the face of a data breach. -- |
Beschreibung: | Includes bibliographical references. - Online resource; title from title page (Safari, viewed August 9, 2014) |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 9781849285841 1849285845 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047742070 | ||
003 | DE-627-1 | ||
005 | 20240228115626.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2014 xx |||||o 00| ||eng c | ||
020 | |a 9781849285841 |c electronic bk. |9 978-1-84928-584-1 | ||
020 | |a 1849285845 |c electronic bk. |9 1-84928-584-5 | ||
035 | |a (DE-627-1)047742070 | ||
035 | |a (DE-599)KEP047742070 | ||
035 | |a (ORHE)9781849285841 | ||
035 | |a (DE-627-1)047742070 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Krausz, Michael |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Information security breaches |b avoidance treatment based on ISO27001 |c Michael Krausz |
250 | |a 2nd ed. | ||
264 | 1 | |a Ely, Cambridgeshire, UK |b IT Governance Press |c 2014 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references. - Online resource; title from title page (Safari, viewed August 9, 2014) | ||
520 | |a This book helps you to manage a security breach by detailing what to do as soon as you discover a breach. Be prepared, be prompt, be decisive. When your organisation's security is compromised, you cannot afford to waste time deciding how to resolve the issue. Updated to cover ISO27001:2013, this second edition gives you clear guidance on how to treat an information security breach and tells you the plans and procedures you have to put in place to minimise damage and return to business as usual. A recovery plan will help you to: recover, and resume normal operations, more quickly; preserve customer confidence by quickly resolving service disruption; secure evidence to help with any criminal investigation and improve your chances of catching those responsible. Read this guide and find out how to manage in the face of a data breach. -- | ||
546 | |a English. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Hacking | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Piratage informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Hacking | |
776 | 1 | |z 1849285837 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1849285837 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781849285841/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047742070 |
---|---|
_version_ | 1829007768852365312 |
adam_text | |
any_adam_object | |
author | Krausz, Michael |
author_facet | Krausz, Michael |
author_role | aut |
author_sort | Krausz, Michael |
author_variant | m k mk |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047742070 (DE-599)KEP047742070 (ORHE)9781849285841 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02736cam a22005412c 4500</leader><controlfield tag="001">ZDB-30-ORH-047742070</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115626.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2014 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849285841</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-84928-584-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849285845</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-84928-584-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047742070</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047742070</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781849285841</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047742070</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Krausz, Michael</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security breaches</subfield><subfield code="b">avoidance treatment based on ISO27001</subfield><subfield code="c">Michael Krausz</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely, Cambridgeshire, UK</subfield><subfield code="b">IT Governance Press</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references. - Online resource; title from title page (Safari, viewed August 9, 2014)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book helps you to manage a security breach by detailing what to do as soon as you discover a breach. Be prepared, be prompt, be decisive. When your organisation's security is compromised, you cannot afford to waste time deciding how to resolve the issue. Updated to cover ISO27001:2013, this second edition gives you clear guidance on how to treat an information security breach and tells you the plans and procedures you have to put in place to minimise damage and return to business as usual. A recovery plan will help you to: recover, and resume normal operations, more quickly; preserve customer confidence by quickly resolving service disruption; secure evidence to help with any criminal investigation and improve your chances of catching those responsible. Read this guide and find out how to manage in the face of a data breach. --</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Piratage informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hacking</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1849285837</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1849285837</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781849285841/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047742070 |
illustrated | Illustrated |
indexdate | 2025-04-10T09:35:33Z |
institution | BVB |
isbn | 9781849285841 1849285845 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | IT Governance Press |
record_format | marc |
spelling | Krausz, Michael VerfasserIn aut Information security breaches avoidance treatment based on ISO27001 Michael Krausz 2nd ed. Ely, Cambridgeshire, UK IT Governance Press 2014 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references. - Online resource; title from title page (Safari, viewed August 9, 2014) This book helps you to manage a security breach by detailing what to do as soon as you discover a breach. Be prepared, be prompt, be decisive. When your organisation's security is compromised, you cannot afford to waste time deciding how to resolve the issue. Updated to cover ISO27001:2013, this second edition gives you clear guidance on how to treat an information security breach and tells you the plans and procedures you have to put in place to minimise damage and return to business as usual. A recovery plan will help you to: recover, and resume normal operations, more quickly; preserve customer confidence by quickly resolving service disruption; secure evidence to help with any criminal investigation and improve your chances of catching those responsible. Read this guide and find out how to manage in the face of a data breach. -- English. Computer security Hacking Computer networks Security measures Computer Security Sécurité informatique Piratage informatique Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Security ; General Computer networks ; Security measures 1849285837 Erscheint auch als Druck-Ausgabe 1849285837 |
spellingShingle | Krausz, Michael Information security breaches avoidance treatment based on ISO27001 Computer security Hacking Computer networks Security measures Computer Security Sécurité informatique Piratage informatique Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Security ; General Computer networks ; Security measures |
title | Information security breaches avoidance treatment based on ISO27001 |
title_auth | Information security breaches avoidance treatment based on ISO27001 |
title_exact_search | Information security breaches avoidance treatment based on ISO27001 |
title_full | Information security breaches avoidance treatment based on ISO27001 Michael Krausz |
title_fullStr | Information security breaches avoidance treatment based on ISO27001 Michael Krausz |
title_full_unstemmed | Information security breaches avoidance treatment based on ISO27001 Michael Krausz |
title_short | Information security breaches |
title_sort | information security breaches avoidance treatment based on iso27001 |
title_sub | avoidance treatment based on ISO27001 |
topic | Computer security Hacking Computer networks Security measures Computer Security Sécurité informatique Piratage informatique Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Security ; General Computer networks ; Security measures |
topic_facet | Computer security Hacking Computer networks Security measures Computer Security Sécurité informatique Piratage informatique Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Security ; General Computer networks ; Security measures |
work_keys_str_mv | AT krauszmichael informationsecuritybreachesavoidancetreatmentbasedoniso27001 |