登入
選單
返回
Google圖書搜尋
Foundations of Information Security based on ISO27001 and ISO27002 – 4th revised edition
Hans Baars
Jule Hintzbergen
Kees Hintzbergen
出版
Van Haren
, 2023-03-05
主題
Architecture / Project Management
Architecture / Codes & Standards
Business & Economics / General
Business & Economics / Development / Business Development
Business & Economics / Finance / General
Business & Economics / Management
Business & Economics / Sales & Selling / General
Business & Economics / Training
Business & Economics / Project Management
Business & Economics / Outsourcing
Business & Economics / Corporate Governance
Computers / Information Technology
Computers / Programming / General
Computers / Software Development & Engineering / General
Education / General
Education / Schools / Levels / Higher
Education / Reference
Education / Statistics
Education / Teaching / General
Education / Teaching / Subjects / Science & Technology
Education / Organizations & Institutions
Education / Teacher Training & Certification
Education / Vocational & Technical
Education / Standards (incl. Common Core)
Reference / General
Technology & Engineering / Project Management
ISBN
9401809607
9789401809603
URL
http://books.google.com.hk/books?id=x1gdEQAAQBAJ&hl=&source=gbs_api
EBook
SAMPLE
註釋
This book is intended for anyone who wants to prepare for the Information Security Foundation based on ISO / IEC 27001 exam of EXIN. All information security concepts in this revised edition are based on the ISO/IEC 27001:2013 and ISO/IEC 27002:2022 standards. A realistic case study running throughout the book usefully demonstrates how theory translates into an operating environment. In all these cases, knowledge about information security is important and this book therefore provides insight and background information about the measures that an organization could take to protect information appropriately. Sometimes security measures are enforced by laws and regulations. This practical and easy-to-read book clearly explains the approaches or policy for information security management that most organizations can consider and implement. It covers: The quality requirements an organization may have for information The risks associated with these quality requirements The countermeasures that are necessary to mitigate these risks How to ensure business continuity in the event of a disaster When and whether to report incidents outside the organization.