IT Governance – An international guide to data security and ISO 27001/ISO 27002, Eighth edition
Available for pre-order now! Publishing June 2024! Recommended textbook for the Open University's postgraduate information security course and the recommended text for all IBITGQ ISO 27001 courses In this updated edition, renowned ISO 27001/27002 experts Alan Calder and Steve Watkins: Discuss t...
Gespeichert in:
| Hauptverfasser: | , |
|---|---|
| Format: | E-Book |
| Sprache: | Englisch |
| Veröffentlicht: |
Ely
IT Governance Publishing
27.06.2024
IT Governance Ltd IT Governance Publishing Ltd |
| Ausgabe: | 1 |
| Schlagworte: | |
| ISBN: | 1787784088, 9781787784086 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Available for pre-order now! Publishing June 2024!
Recommended textbook for the Open University's postgraduate
information security course and the recommended text for all IBITGQ
ISO 27001 courses
In this updated edition, renowned ISO 27001/27002 experts Alan
Calder and Steve Watkins:
Discuss the ISO 27001/27002:2022 updates;
Provide guidance on how to establish a strong IT governance
system and an ISMS (information security management system) that
complies with ISO 27001 and ISO 27002;
Highlight why data protection and information security are
vital in our ever-changing online and physical environments;
Reflect on changes to international legislation, e.g. the GDPR
(General Data Protection Regulation); and
Review key topics such as risk assessment, asset management,
controls, security, supplier relationships and compliance.
Fully updated to align with ISO 27001/27002:2022
IT Governance - An international guide to data security and
ISO 27001/ISO 27002, Eighth edition provides:
Expert information security management and governance guidance
based on international best practice;
Guidance on how to protect and enhance your organisation with
an ISO 27001:2022-compliant ISMS; and
Discussion around the changes to international legislation,
including ISO 27001:2022 and ISO 27002:2022.
As cyber threats continue to increase in prevalence and
ferocity, it is more important than ever to implement a secure ISMS
to protect your organisation. Certifying your ISMS to ISO 27001 and
ISO 27002 demonstrates to customers and stakeholders that your
organisation is handling data securely. |
|---|---|
| AbstractList | This book provides expert information security management and governance guidance based on ISO 27001:2022 and ISO 27002:2022. Available for pre-order now! Publishing June 2024! Recommended textbook for the Open University's postgraduate information security course and the recommended text for all IBITGQ ISO 27001 courses In this updated edition, renowned ISO 27001/27002 experts Alan Calder and Steve Watkins: Discuss the ISO 27001/27002:2022 updates; Provide guidance on how to establish a strong IT governance system and an ISMS (information security management system) that complies with ISO 27001 and ISO 27002; Highlight why data protection and information security are vital in our ever-changing online and physical environments; Reflect on changes to international legislation, e.g. the GDPR (General Data Protection Regulation); and Review key topics such as risk assessment, asset management, controls, security, supplier relationships and compliance. Fully updated to align with ISO 27001/27002:2022 IT Governance - An international guide to data security and ISO 27001/ISO 27002, Eighth edition provides: Expert information security management and governance guidance based on international best practice; Guidance on how to protect and enhance your organisation with an ISO 27001:2022-compliant ISMS; and Discussion around the changes to international legislation, including ISO 27001:2022 and ISO 27002:2022. As cyber threats continue to increase in prevalence and ferocity, it is more important than ever to implement a secure ISMS to protect your organisation. Certifying your ISMS to ISO 27001 and ISO 27002 demonstrates to customers and stakeholders that your organisation is handling data securely. |
| Author | Watkins, Steve Calder, Alan |
| Author_xml | – sequence: 1 fullname: Calder, Alan – sequence: 2 fullname: Watkins, Steve |
| BookMark | eNpVkM1OwzAQhI34EbT0yBkfQaLUiZ3EPpaqlEqVeqDiGm2cTZsSbEjconLiHXhDngRX5UfsZWdGn0arbZEDYw0Schawa-anpxIZJDJJpGCK75HWr4n3_4yUR94IwZVgPjomnaYpMxZ5HcUiOSEwntGRXWNtwGikn-8ftG9oadw2caU1UNH5qsyROktzcEAb1Ku6dBsKJqfj-ykNE8aC3o8Kr-iwnC_cgmJebgtOyWEBVYOd790mD7fD2eCuO5mOxoP-pAtBICLejSKGecxVIQompOIZaqmVxCSMC64hCougEMjjgCEHDkyDzCBDBUzlEnjB2-RyV_wKlT8_x3m92niRPkGt03_v8uzFjn2u7csKG5diZu2jRuNqqNLhzYCzUAY8Yh4936HLxtk63WJNuky1W3MeP4dvin8Brv90Mw |
| ContentType | eBook |
| Copyright | 2024 Alan Calder 2024 Steve Watkins |
| Copyright_xml | – notice: 2024 Alan Calder – notice: 2024 Steve Watkins |
| DOI | 10.0000/9781787784093 |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science Business |
| EISBN | 1787784096 9781787784093 178778410X 9781787784109 |
| Edition | 1 |
| ExternalDocumentID | 9781787784093 EBC30281350 j.ctv336p2z9 |
| GroupedDBID | ALMA_UNASSIGNED_HOLDINGS I4C |
| ID | FETCH-LOGICAL-a11453-550ed639f4f04893bec8c98e726f3ca52f1f4e3610e3a3a0ca8babe9a09d8a3f3 |
| ISBN | 1787784088 9781787784086 |
| IngestDate | Fri Nov 21 19:47:59 EST 2025 Wed Nov 19 05:14:01 EST 2025 Sun Jun 29 11:40:15 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Keywords | 27001 book Steve Watkins ISO 27002 books Alan calder ISO/IEC 27001 2022 27001 27002 it governance ISO/IEC 27001 ISO/IEC 27002 ISO/IEC 27001:2022 ISO 27001 implementation ISO 27002 controls iso27002 ISO27001 implementation ISO/IEC 27002:2022 iso27001 iso27001 books iso27001 book iso 27001 ISMS iso 27002 iso27002 books ISO 27001 book ISO 27001 books ISO IEC 27001 ISO IEC 27002 |
| LCCallNum_Ident | QA76.9.A25 |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-a11453-550ed639f4f04893bec8c98e726f3ca52f1f4e3610e3a3a0ca8babe9a09d8a3f3 |
| OCLC | 1443940787 |
| PQID | EBC30281350 |
| PageCount | 486 |
| ParticipantIDs | walterdegruyter_marc_9781787784093 proquest_ebookcentral_EBC30281350 jstor_books_j_ctv336p2z9 |
| PublicationCentury | 2000 |
| PublicationDate | 20240627 2023 [2024] |
| PublicationDateYYYYMMDD | 2024-06-27 2023-01-01 2024-01-01 |
| PublicationDate_xml | – month: 06 year: 2024 text: 20240627 day: 27 |
| PublicationDecade | 2020 |
| PublicationPlace | Ely |
| PublicationPlace_xml | – name: Ely |
| PublicationYear | 2024 2023 |
| Publisher | IT Governance Publishing IT Governance Ltd IT Governance Publishing Ltd |
| Publisher_xml | – name: IT Governance Publishing – name: IT Governance Ltd – name: IT Governance Publishing Ltd |
| RestrictionsOnAccess | restricted access |
| SSID | ssib057875647 ssib057179866 ssib055843402 ssib055051872 ssib055913924 ssib057180040 ssib055816162 ssib055900376 |
| Score | 2.4478652 |
| Snippet | Available for pre-order now! Publishing June 2024!
Recommended textbook for the Open University's postgraduate
information security course and the recommended... This book provides expert information security management and governance guidance based on ISO 27001:2022 and ISO 27002:2022. |
| SourceID | walterdegruyter proquest jstor |
| SourceType | Publisher |
| SubjectTerms | 27001 27001 book 27002 Alan calder Business BUSINESS & ECONOMICS / Corporate Governance COM053000 COMPUTERS / Security / General Computer Science ISMS iso 27001 ISO 27001 book ISO 27001 books ISO 27001 implementation iso 27002 ISO 27002 books ISO 27002 controls ISO IEC 27001 ISO IEC 27002 ISO/IEC 27001 2022 ISO/IEC 27002:2022 iso27001 iso27001 book iso27001 books ISO27001 implementation iso27002 iso27002 books it governance Security Studies Steve Watkins Technology |
| TableOfContents | Front Matter
ABOUT THE AUTHORS
Table of Contents
INTRODUCTION
CHAPTER 1:: WHY IS INFORMATION SECURITY NECESSARY?
CHAPTER 2:: THE CORPORATE GOVERNANCE CODE, THE FRC GUIDANCE ON RISK MANAGEMENT, AND SARBANES–OXLEY
CHAPTER 3:: ISO 27001
CHAPTER 4:: ORGANIZING INFORMATION SECURITY
CHAPTER 5:: INFORMATION SECURITY POLICY AND SCOPE
CHAPTER 6:: THE RISK ASSESSMENT AND STATEMENT OF APPLICABILITY
CHAPTER 7:: MOBILE AND REMOTE WORKING
CHAPTER 8:: HUMAN RESOURCES SECURITY
CHAPTER 9:: ASSET MANAGEMENT
CHAPTER 10:: EXCHANGES OF INFORMATION
CHAPTER 11:: ACCESS CONTROL
CHAPTER 12:: USER ACCESS MANAGEMENT
CHAPTER 13:: SUPPLIER RELATIONSHIPS
CHAPTER 14:: PHYSICAL AND ENVIRONMENTAL SECURITY
CHAPTER 15:: EQUIPMENT SECURITY
CHAPTER 16:: SYSTEM AND APPLICATION ACCESS CONTROL
CHAPTER 17:: CRYPTOGRAPHY
CHAPTER 18:: OPERATIONS SECURITY
CHAPTER 19:: CONTROLS AGAINST MALICIOUS SOFTWARE (MALWARE)
CHAPTER 20:: NETWORKS SECURITY
CHAPTER 21:: SYSTEM ACQUISITION, DEVELOPMENT, AND MAINTENANCE
CHAPTER 22:: DEVELOPMENT AND SUPPORT PROCESSES
CHAPTER 23:: MONITORING AND INFORMATION SECURITY INCIDENT MANAGEMENT
CHAPTER 24:: BUSINESS AND INFORMATION SECURITY CONTINUITY MANAGEMENT
CHAPTER 25:: COMPLIANCE
CHAPTER 26:: THE ISO 27001 AUDIT
APPENDIX 1:
APPENDIX 2:
INDEX IT Governance – An international guide to data security and ISO 27001/ISO 27002, Eighth edition |
| Title | IT Governance – An international guide to data security and ISO 27001/ISO 27002, Eighth edition |
| URI | https://www.jstor.org/stable/j.ctv336p2z9 https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=30281350 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELagRYgLj0LVLQ8ZxC2EJrYTO8ewBIFYLUiNSm9RnDjVckir3WxbOPEf-If8EsZOnGxWcODAJfJEq03iGdvzzROhl5RVEoCFdJmvKgAoUeVKPwzcUCrK4cDnXJrq-jM-n4vT0-hz1x9zZdoJ8LoW19fRxX9lNdwDZuvU2X9gd_-ncAPGwHS4AtvhuqUR92QXjZ52nXNNFoCNYqDa7rcY2f3O1ovSdMzQ4aHOqutg10YGH39yjJMYnm_HxOyXxoLqwFG36bmPZ_Hcmcazt0nvMDpOk5PE-RKnvV2gsykQpmOf2hT9FmeO3newh42wpw9LnWt4SP-0E-tzsA2-GP9uq7j119dFc0lpeEG-RzfRrnYDawT9Me03CY2gfDEk9waBACU13KQZZd4GrQudDiXoA65Lsg06K9BC71wDDYgtZLp3o31TIbpaYJYO2-Ks-puORl9kg1hH8OTulQl0KNXZcv2tsY51o6-k99Gu0kksD9ANVe-h2za7YQ_ds108cLepP0T5hxQPfMC_fvzEcY1HEoONxODmHGuJwVZiMEgMBinBRmKO7Ii8wq204E5aHqGTd0k6fe92jTfcHOBxQF2YdFWC7lqxytPViWChiyISipOwokUekMqvmKKgeiua09wrciFzqaLci0qR04ruo536vFYHCPsFE6QkMlSSMSqDnEdlIEnkl0FRKcIn6MBMYabXzAqw6CAQE_TczmpmQge6eOUseTOloBf7NPAm6MXWdGe6Bkw2YtPh35_xGN0ZFsATtNMs1-opulVcNovV8pmRxN8F7Ws8 |
| linkProvider | Knovel |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=IT+Governance+%E2%80%93+An+international+guide+to+data+security+and+ISO+27001%2FISO+27002%2C+Eighth+edition&rft.au=ALAN+CALDER&rft.au=STEVE+WATKINS&rft.date=2024-06-27&rft.pub=IT+Governance+Publishing&rft.isbn=9781787784093&rft_id=info:doi/10.0000%2F9781787784093&rft.externalDocID=j.ctv336p2z9 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781787784086/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781787784086/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781787784086/sc.gif&client=summon&freeimage=true |

