Mastering information security compliance management : (Record no. 22640)

MARC details
000 -LEADER
fixed length control field 03725nam a22002417a 4500
003 - CONTROL NUMBER IDENTIFIER
control field NULRC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250614092013.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250614b ph ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781803243160
040 ## - CATALOGING SOURCE
Transcribing agency NULRC
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Nair, Adarsh
Relator term author
245 ## - TITLE STATEMENT
Title Mastering information security compliance management :
Remainder of title A Comprehensive handbook on ISO/IEC 27001:2022 compliance /
Statement of responsibility, etc. Adarsh Nair and Greeshma M. R.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Birmingham :
Name of publisher, distributor, etc. Packt Publishing,
Date of publication, distribution, etc. 2023.
300 ## - PHYSICAL DESCRIPTION
Extent 219 pages ;
365 ## - TRADE PRICE
Price amount USD40.00
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- <br/>Title Page -- <br/>Copyright and Credits -- <br/>Contributors -- <br/>Table of Contents -- <br/>Part 1: Setting the Stage – Definitions, Concepts, Principles, Standards, and Certifications -- <br/>Chapter 1: Foundations, Standards, and Principles of Information Security -- <br/>Chapter 2: Introduction to ISO 27001 -- <br/>Part 2: The Protection Strategy – ISO/IEC 27001/02 Design and Implementation -- <br/>Chapter 3: ISMS Controls -- <br/>Chapter 4: Risk Management -- <br/>Chapter 5: ISMS – Phases of Implementation -- <br/>Chapter 6: Information Security Incident Management -- <br/>Chapter 7: Case Studies – Certification, SoA, and Incident Management -- <br/>Part 3: How to Sustain – Monitoring and Measurement -- <br/>Chapter 8: Audit Principles, Concepts, and Planning -- <br/>Chapter 9: Performing an Audit -- <br/>Chapter 10: Audit Reporting, Follow-Up, and Strategies for Continual Improvement -- <br/>Chapter 11: Auditor Competence and Evaluation -- <br/>Chapter 12: Case Studies – Audit Planning, Reporting Nonconformities, and Audit Reporting -- <br/>Appendix – Terms and Definitions -- <br/>Index -- <br/>Other Books You May Enjoy.
520 ## - SUMMARY, ETC.
Summary, etc. Strengthen your ability to implement, assess, evaluate, and enhance the effectiveness of information security controls based on ISO/IEC 27001/27002:2022 standards Purchase of the print or Kindle book includes a free PDF eBook Key Features Familiarize yourself with the clauses and control references of ISO/IEC 27001:2022Define and implement an information security management system aligned with ISO/IEC 27001/27002:2022Conduct management system audits to evaluate their effectiveness and adherence to ISO/IEC 27001/27002:2022Book Description ISO 27001 and ISO 27002 are globally recognized standards for information security management systems (ISMSs), providing a robust framework for information protection that can be adapted to all organization types and sizes. Organizations with significant exposure to information-security–related risks are increasingly choosing to implement an ISMS that complies with ISO 27001. This book will help you understand the process of getting your organization's information security management system certified by an accredited certification body. The book begins by introducing you to the standards, and then takes you through different principles and terminologies. Once you completely understand these standards, you'll explore their execution, wherein you find out how to implement these standards in different sizes of organizations. The chapters also include case studies to enable you to understand how you can implement the standards in your organization. Finally, you'll get to grips with the auditing process, planning, techniques, and reporting and learn to audit for ISO 27001. By the end of this book, you'll have gained a clear understanding of ISO 27001/27002 and be ready to successfully implement and audit for these standards.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element INFORMATION STORAGE AND RETRIEVAL SYSTEMS -- SECURITY MEASURES
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name M. R., Greeshma
Relator term co-author
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://research.ebsco.com/c/nahjoz/search/details/m2p6cwnjn5?db=nlebk&db=nlabk">https://research.ebsco.com/c/nahjoz/search/details/m2p6cwnjn5?db=nlebk&db=nlabk</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Electronic Resources
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total checkouts Barcode Date last seen Copy number Koha item type
    Library of Congress Classification     Accountancy LRC - Annex II National University - Manila Electronic Books 05/16/2025 Purchased - GOBI 40.00   EBK000000070 06/14/2025 c.1 Electronic Resources