Information security management principles:
This book is a pragmatic guide to information assurance for both business professionals and technical experts. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Security Management Principles, which the book support...
Gespeichert in:
Beteiligte Personen: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Swindon, UK
BCS, The Chartered Institute for IT
[2020]
|
Ausgabe: | Third edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781780175201/?ar |
Zusammenfassung: | This book is a pragmatic guide to information assurance for both business professionals and technical experts. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Security Management Principles, which the book supports. |
Beschreibung: | Includes index |
Umfang: | 1 Online-Ressource (268 Seiten) illustrations |
ISBN: | 9781780175201 1780175205 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-081558392 | ||
003 | DE-627-1 | ||
005 | 20240228121741.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220815s2020 xx |||||o 00| ||eng c | ||
020 | |a 9781780175201 |c electronic bk. |9 978-1-78017-520-1 | ||
020 | |a 1780175205 |c electronic bk. |9 1-78017-520-5 | ||
035 | |a (DE-627-1)081558392 | ||
035 | |a (DE-599)KEP081558392 | ||
035 | |a (ORHE)9781780175201 | ||
035 | |a (DE-627-1)081558392 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 658.478 |2 23/eng/20220727 | |
100 | 1 | |a Taylor, Andy |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Information security management principles |c Andy Taylor ; David Alexander, Amanda Finch and David Sutton |
250 | |a Third edition. | ||
264 | 1 | |a Swindon, UK |b BCS, The Chartered Institute for IT |c [2020] | |
300 | |a 1 Online-Ressource (268 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a This book is a pragmatic guide to information assurance for both business professionals and technical experts. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Security Management Principles, which the book supports. | ||
650 | 0 | |a Computer security |x Management | |
650 | 4 | |a Sécurité informatique ; Gestion | |
650 | 4 | |a Computer security | |
650 | 4 | |a Management & management techniques | |
650 | 4 | |a Network management | |
650 | 4 | |a BUSINESS & ECONOMICS / Information Management | |
650 | 4 | |a COMPUTERS / Networking / Security | |
650 | 4 | |a COMPUTERS / Management Information Systems | |
650 | 4 | |a Computer security ; Management | |
650 | 4 | |a Computer security | |
650 | 4 | |a Management & management techniques | |
650 | 4 | |a Network management | |
700 | 1 | |a Alexander, David |e VerfasserIn |4 aut | |
700 | 1 | |a Finch, Amanda |e VerfasserIn |4 aut | |
700 | 1 | |a Sutton, David |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781780175201/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-081558392 |
---|---|
_version_ | 1821494820488609792 |
adam_text | |
any_adam_object | |
author | Taylor, Andy Alexander, David Finch, Amanda Sutton, David |
author_facet | Taylor, Andy Alexander, David Finch, Amanda Sutton, David |
author_role | aut aut aut aut |
author_sort | Taylor, Andy |
author_variant | a t at d a da a f af d s ds |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)081558392 (DE-599)KEP081558392 (ORHE)9781780175201 |
dewey-full | 658.478 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.478 |
dewey-search | 658.478 |
dewey-sort | 3658.478 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | Third edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02255cam a22005412 4500</leader><controlfield tag="001">ZDB-30-ORH-081558392</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121741.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220815s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781780175201</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-78017-520-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1780175205</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-78017-520-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)081558392</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP081558392</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781780175201</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)081558392</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.478</subfield><subfield code="2">23/eng/20220727</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Taylor, Andy</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security management principles</subfield><subfield code="c">Andy Taylor ; David Alexander, Amanda Finch and David Sutton</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Third edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Swindon, UK</subfield><subfield code="b">BCS, The Chartered Institute for IT</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (268 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book is a pragmatic guide to information assurance for both business professionals and technical experts. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Security Management Principles, which the book supports.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management & management techniques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Network management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS / Information Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Networking / Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Management Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management & management techniques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Network management</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Alexander, David</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Finch, Amanda</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sutton, David</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781780175201/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-081558392 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:27Z |
institution | BVB |
isbn | 9781780175201 1780175205 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (268 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | BCS, The Chartered Institute for IT |
record_format | marc |
spelling | Taylor, Andy VerfasserIn aut Information security management principles Andy Taylor ; David Alexander, Amanda Finch and David Sutton Third edition. Swindon, UK BCS, The Chartered Institute for IT [2020] 1 Online-Ressource (268 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index This book is a pragmatic guide to information assurance for both business professionals and technical experts. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Security Management Principles, which the book supports. Computer security Management Sécurité informatique ; Gestion Computer security Management & management techniques Network management BUSINESS & ECONOMICS / Information Management COMPUTERS / Networking / Security COMPUTERS / Management Information Systems Computer security ; Management Alexander, David VerfasserIn aut Finch, Amanda VerfasserIn aut Sutton, David VerfasserIn aut |
spellingShingle | Taylor, Andy Alexander, David Finch, Amanda Sutton, David Information security management principles Computer security Management Sécurité informatique ; Gestion Computer security Management & management techniques Network management BUSINESS & ECONOMICS / Information Management COMPUTERS / Networking / Security COMPUTERS / Management Information Systems Computer security ; Management |
title | Information security management principles |
title_auth | Information security management principles |
title_exact_search | Information security management principles |
title_full | Information security management principles Andy Taylor ; David Alexander, Amanda Finch and David Sutton |
title_fullStr | Information security management principles Andy Taylor ; David Alexander, Amanda Finch and David Sutton |
title_full_unstemmed | Information security management principles Andy Taylor ; David Alexander, Amanda Finch and David Sutton |
title_short | Information security management principles |
title_sort | information security management principles |
topic | Computer security Management Sécurité informatique ; Gestion Computer security Management & management techniques Network management BUSINESS & ECONOMICS / Information Management COMPUTERS / Networking / Security COMPUTERS / Management Information Systems Computer security ; Management |
topic_facet | Computer security Management Sécurité informatique ; Gestion Computer security Management & management techniques Network management BUSINESS & ECONOMICS / Information Management COMPUTERS / Networking / Security COMPUTERS / Management Information Systems Computer security ; Management |
work_keys_str_mv | AT taylorandy informationsecuritymanagementprinciples AT alexanderdavid informationsecuritymanagementprinciples AT finchamanda informationsecuritymanagementprinciples AT suttondavid informationsecuritymanagementprinciples |