Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
53,40 €*
Versandkostenfrei per Post / DHL
Lieferzeit 1-2 Wochen
Kategorien:
Beschreibung
Strengthen your ability to implement, assess, evaluate, and enhance the effectiveness of information security controls based on ISO/IEC 27001/27002:2022 standards
Purchase of the print or Kindle book includes a free PDF eBook
Key Features:Familiarize yourself with the clauses and control references of ISO/IEC 27001:2022
Define and implement an information security management system aligned with ISO/IEC 27001/27002:2022
Conduct management system audits to evaluate their effectiveness and adherence to ISO/IEC 27001/27002:2022
Book Description:
ISO 27001 and ISO 27002 are globally recognized standards for information security management systems (ISMSs), providing a robust framework for information protection that can be adapted to all organization types and sizes. Organizations with significant exposure to information-security-related risks are increasingly choosing to implement an ISMS that complies with ISO 27001. This book will help you understand the process of getting your organization's information security management system certified by an accredited certification body.
The book begins by introducing you to the standards, and then takes you through different principles and terminologies. Once you completely understand these standards, you'll explore their execution, wherein you find out how to implement these standards in different sizes of organizations. The chapters also include case studies to enable you to understand how you can implement the standards in your organization. Finally, you'll get to grips with the auditing process, planning, techniques, and reporting and learn to audit for ISO 27001.
By the end of this book, you'll have gained a clear understanding of ISO 27001/27002 and be ready to successfully implement and audit for these standards.
What You Will Learn:Develop a strong understanding of the core principles underlying information security
Gain insights into the interpretation of control requirements in the ISO 27001/27002:2022 standard
Understand the various components of ISMS with practical examples and case studies
Explore risk management strategies and techniques
Develop an audit plan that outlines the scope, objectives, and schedule of the audit
Explore real-world case studies that illustrate successful implementation approaches
Who this book is for:
This book is for information security professionals, including information security managers, consultants, auditors, officers, risk specialists, business owners, and individuals responsible for implementing, auditing, and administering information security management systems. Basic knowledge of organization-level information security management, such as risk assessment, security controls, and auditing, will help you grasp the topics in this book easily.
Purchase of the print or Kindle book includes a free PDF eBook
Key Features:Familiarize yourself with the clauses and control references of ISO/IEC 27001:2022
Define and implement an information security management system aligned with ISO/IEC 27001/27002:2022
Conduct management system audits to evaluate their effectiveness and adherence to ISO/IEC 27001/27002:2022
Book Description:
ISO 27001 and ISO 27002 are globally recognized standards for information security management systems (ISMSs), providing a robust framework for information protection that can be adapted to all organization types and sizes. Organizations with significant exposure to information-security-related risks are increasingly choosing to implement an ISMS that complies with ISO 27001. This book will help you understand the process of getting your organization's information security management system certified by an accredited certification body.
The book begins by introducing you to the standards, and then takes you through different principles and terminologies. Once you completely understand these standards, you'll explore their execution, wherein you find out how to implement these standards in different sizes of organizations. The chapters also include case studies to enable you to understand how you can implement the standards in your organization. Finally, you'll get to grips with the auditing process, planning, techniques, and reporting and learn to audit for ISO 27001.
By the end of this book, you'll have gained a clear understanding of ISO 27001/27002 and be ready to successfully implement and audit for these standards.
What You Will Learn:Develop a strong understanding of the core principles underlying information security
Gain insights into the interpretation of control requirements in the ISO 27001/27002:2022 standard
Understand the various components of ISMS with practical examples and case studies
Explore risk management strategies and techniques
Develop an audit plan that outlines the scope, objectives, and schedule of the audit
Explore real-world case studies that illustrate successful implementation approaches
Who this book is for:
This book is for information security professionals, including information security managers, consultants, auditors, officers, risk specialists, business owners, and individuals responsible for implementing, auditing, and administering information security management systems. Basic knowledge of organization-level information security management, such as risk assessment, security controls, and auditing, will help you grasp the topics in this book easily.
Strengthen your ability to implement, assess, evaluate, and enhance the effectiveness of information security controls based on ISO/IEC 27001/27002:2022 standards
Purchase of the print or Kindle book includes a free PDF eBook
Key Features:Familiarize yourself with the clauses and control references of ISO/IEC 27001:2022
Define and implement an information security management system aligned with ISO/IEC 27001/27002:2022
Conduct management system audits to evaluate their effectiveness and adherence to ISO/IEC 27001/27002:2022
Book Description:
ISO 27001 and ISO 27002 are globally recognized standards for information security management systems (ISMSs), providing a robust framework for information protection that can be adapted to all organization types and sizes. Organizations with significant exposure to information-security-related risks are increasingly choosing to implement an ISMS that complies with ISO 27001. This book will help you understand the process of getting your organization's information security management system certified by an accredited certification body.
The book begins by introducing you to the standards, and then takes you through different principles and terminologies. Once you completely understand these standards, you'll explore their execution, wherein you find out how to implement these standards in different sizes of organizations. The chapters also include case studies to enable you to understand how you can implement the standards in your organization. Finally, you'll get to grips with the auditing process, planning, techniques, and reporting and learn to audit for ISO 27001.
By the end of this book, you'll have gained a clear understanding of ISO 27001/27002 and be ready to successfully implement and audit for these standards.
What You Will Learn:Develop a strong understanding of the core principles underlying information security
Gain insights into the interpretation of control requirements in the ISO 27001/27002:2022 standard
Understand the various components of ISMS with practical examples and case studies
Explore risk management strategies and techniques
Develop an audit plan that outlines the scope, objectives, and schedule of the audit
Explore real-world case studies that illustrate successful implementation approaches
Who this book is for:
This book is for information security professionals, including information security managers, consultants, auditors, officers, risk specialists, business owners, and individuals responsible for implementing, auditing, and administering information security management systems. Basic knowledge of organization-level information security management, such as risk assessment, security controls, and auditing, will help you grasp the topics in this book easily.
Purchase of the print or Kindle book includes a free PDF eBook
Key Features:Familiarize yourself with the clauses and control references of ISO/IEC 27001:2022
Define and implement an information security management system aligned with ISO/IEC 27001/27002:2022
Conduct management system audits to evaluate their effectiveness and adherence to ISO/IEC 27001/27002:2022
Book Description:
ISO 27001 and ISO 27002 are globally recognized standards for information security management systems (ISMSs), providing a robust framework for information protection that can be adapted to all organization types and sizes. Organizations with significant exposure to information-security-related risks are increasingly choosing to implement an ISMS that complies with ISO 27001. This book will help you understand the process of getting your organization's information security management system certified by an accredited certification body.
The book begins by introducing you to the standards, and then takes you through different principles and terminologies. Once you completely understand these standards, you'll explore their execution, wherein you find out how to implement these standards in different sizes of organizations. The chapters also include case studies to enable you to understand how you can implement the standards in your organization. Finally, you'll get to grips with the auditing process, planning, techniques, and reporting and learn to audit for ISO 27001.
By the end of this book, you'll have gained a clear understanding of ISO 27001/27002 and be ready to successfully implement and audit for these standards.
What You Will Learn:Develop a strong understanding of the core principles underlying information security
Gain insights into the interpretation of control requirements in the ISO 27001/27002:2022 standard
Understand the various components of ISMS with practical examples and case studies
Explore risk management strategies and techniques
Develop an audit plan that outlines the scope, objectives, and schedule of the audit
Explore real-world case studies that illustrate successful implementation approaches
Who this book is for:
This book is for information security professionals, including information security managers, consultants, auditors, officers, risk specialists, business owners, and individuals responsible for implementing, auditing, and administering information security management systems. Basic knowledge of organization-level information security management, such as risk assessment, security controls, and auditing, will help you grasp the topics in this book easily.
Über den Autor
Adarsh Nair is the global head of information security at UST. He is a recognized information security strategist, author, and keynote speaker. Adarsh holds the title of Fellow of Information Privacy (FIP) by IAPP and is a Google Hall of Fame honoree. He serves as co-chair of OWASP Kerala Chapter, an IAPP exam development board member, and an EC-Council advisory board [...] a decade of experience, Adarsh specializes in information security governance, risk and compliance, business continuity, data privacy, ethical hacking, and threat identification and mitigation. He maintains expertise through memberships, training, and certifications, including CISSP, CIPM, CIPP/E, LPT, OSCP, and ISO Lead Auditor.Adarsh has authored two books, published numerous articles and research papers, and delivered impactful presentations at national and international conferences, establishing himself as a thought leader in information security.
Details
Erscheinungsjahr: | 2023 |
---|---|
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
ISBN-13: | 9781803231174 |
ISBN-10: | 1803231173 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: |
Nair, Adarsh
R., Greeshma M. |
Hersteller: | Packt Publishing |
Verantwortliche Person für die EU: | Books on Demand GmbH, In de Tarpen 42, D-22848 Norderstedt, info@bod.de |
Maße: | 235 x 191 x 13 mm |
Von/Mit: | Adarsh Nair (u. a.) |
Erscheinungsdatum: | 11.08.2023 |
Gewicht: | 0,449 kg |
Über den Autor
Adarsh Nair is the global head of information security at UST. He is a recognized information security strategist, author, and keynote speaker. Adarsh holds the title of Fellow of Information Privacy (FIP) by IAPP and is a Google Hall of Fame honoree. He serves as co-chair of OWASP Kerala Chapter, an IAPP exam development board member, and an EC-Council advisory board [...] a decade of experience, Adarsh specializes in information security governance, risk and compliance, business continuity, data privacy, ethical hacking, and threat identification and mitigation. He maintains expertise through memberships, training, and certifications, including CISSP, CIPM, CIPP/E, LPT, OSCP, and ISO Lead Auditor.Adarsh has authored two books, published numerous articles and research papers, and delivered impactful presentations at national and international conferences, establishing himself as a thought leader in information security.
Details
Erscheinungsjahr: | 2023 |
---|---|
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
ISBN-13: | 9781803231174 |
ISBN-10: | 1803231173 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: |
Nair, Adarsh
R., Greeshma M. |
Hersteller: | Packt Publishing |
Verantwortliche Person für die EU: | Books on Demand GmbH, In de Tarpen 42, D-22848 Norderstedt, info@bod.de |
Maße: | 235 x 191 x 13 mm |
Von/Mit: | Adarsh Nair (u. a.) |
Erscheinungsdatum: | 11.08.2023 |
Gewicht: | 0,449 kg |
Sicherheitshinweis