Iso27001

Páginas: 194 (48374 palabras) Publicado: 22 de octubre de 2010
How to Achieve 27001 Certification

OTHER INFORMATION SECURITY BOOKS FROM AUERBACH
802.1X Port-Based Authentication Edwin Lyle Brown ISBN: 1-4200-4464-8 Audit and Trace Log Management: Consolidation and Analysis Phillip Q. Maier ISBN: 0-8493-2725-3 The CISO Handbook: A Practical Guide to Securing Your Company Michael Gentile, Ron Collette and Thomas D. August ISBN: 0-8493-1952-8 CompleteGuide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI Debra S. Herrmann ISBN: 0-8493-5402-1 Crisis Management Planning and Execution Edward S. Devlin ISBN: 0-8493-2244-8 Computer Forensics: Evidence Collection and Management Robert C. Newman ISBN: 0-8493-0561-6 Curing the Patch Management Headache Felicia M Nicastro ISBN: 0-8493-2854-3 Cyber CrimeInvestigator's Field Guide, Second Edition Bruce Middleton ISBN: 0-8493-2768-7 Database and Applications Security: Integrating Information Security and Data Management Bhavani Thuraisingham ISBN: 0-8493-2224-3 Guide to Optimal Operational Risk and BASEL II Ioannis S. Akkizidis and Vivianne Bouchereau ISBN: 0-8493-3813-1 How to Achieve 27001 Certification: An Example of Applied Compliance ManagementSigurjon Thor Arnason and Keith D. Willett ISBN: 0-8493-3648-1 Information Security: Design, Implementation, Measurement, and Compliance Timothy P. Layton ISBN: 0-8493-7087-6 Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition Jan Killmeyer ISBN: 0-8493-1549-2 Information Security Cost Management Ioana V. Bazavan and Ian Lim ISBN: 0-8493-9275-6Information Security Fundamentals Thomas R. Peltier, Justin Peltier, and John A. Blackley ISBN: 0-8493-1957-9 Information Security Management Handbook, Sixth Edition Harold F. Tipton and Micki Krause ISBN: 0-8493-7495-2 Information Security Risk Analysis, Second Edition Thomas R. Peltier ISBN: 0-8493-3346-6 Investigations in the Workplace Eugene F. Ferraro ISBN: 0-8493-1648-0 IT SecurityGovernance Guidebook with Security Program Metrics on CD-ROM Fred Cohen ISBN: 0-8493-8435-4 Managing an Information Security and Privacy Awareness and Training Program Rebecca Herold ISBN: 0-8493-2963-9 Mechanics of User Identification and Authentication: Fundamentals of Identity Management Dobromir Todorov ISBN: 1-4200-5219-5 Practical Hacking Techniques and Countermeasures Mark D. Spivey ISBN:0-8493-7057-4 Securing Converged IP Networks Tyson Macaulay ISBN: 0-8493-7580-0 The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments Douglas J. Landoll ISBN: 0-8493-2998-1 Testing Code Security Maura A. van der Linden ISBN: 0-8493-9251-9 Wireless Crime and Forensic Investigation Gregory Kipper ISBN: 0-8493-3188-9

AUERBACH PUBLICATIONSwww.auerbach-publications.com To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401 E-mail: orders@crcpress.com

How to Achieve 27001 Certification
An Example of Applied Compliance Management

New York

London

LOC Page

Contents
Preface.............................................................................................................xiIntroduction................................................................................................. xiii

1

Introduction.to.International.Standards.Organization.Security. Standards................................................................................................1 . 1.1 Objectives .........................................................................................1 1.2 Cornerstones of Information Security...............................................2 1.3 T e History of ISO Information Security Standards ........................3 h 1.4 nformation Security Standards Road Map and Numbering ............4 I 1.5 International Security Management Standards .................................4 1.6 Other Proposed Information Security Standards ..............................5 1.7 Introduction to the ISO/IEC 27001...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • Iso27001
  • Iso27001
  • ISO27001:2013
  • Ejemplo auditoria de sistemas ISO27001
  • Evaluacion Riesgo Iso27001
  • An introduction to iso 27001 (iso27001)

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS