ISO27001 in a Windows environment : the best practice handbook for a Microsoft Windows environment / Brian Honan.

By: Honan, BrianContributor(s): Honan, Brian. Implementing ISO27001 in a Windows environmentMaterial type: TextTextSeries: JSTOR eBooksPublisher: Ely, UK : IT Governance, 2010Edition: 2nd edDescription: 1 online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9781849280501; 1849280509; 9781282737099; 1282737090Subject(s): Data protection -- Standards | Data protection -- Evaluation | Protection de l'information (Informatique)DDC classification: 005.8/0218 LOC classification: HF5548.37 | .H66 2010Online resources: Click here to view this ebook.
Contents:
INTRODUCTION; CHAPTER 1: INFORMATION AND INFORMATION SECURITY; CHAPTER 2: USING AN ISMS TO COUNTER THE THREATS; CHAPTER 3: AN INTRODUCTION TO ISO27001; CHAPTER 4: IDENTIFY YOUR INFORMATION ASSETS; CHAPTER 5: CONDUCTING A RISK ASSESSMENT; CHAPTER 6: AN OVERVIEW OF MICROSOFT TECHNOLOGIES; CHAPTER 7: IMPLEMENTING ISO27001 IN A MICROSOFT ENVIRONMENT; CHAPTER 8: SECURING THE WINDOWS® ENVIRONMENT; CHAPTER 9: SECURING THE MICROSOFT® WINDOWS SERVER® PLATFORM; CHAPTER 10: AUDITING AND MONITORING; CHAPTER 11: SECURING YOUR SERVERS.
Summary: Ideal for project managers, IT and security staff, this book plugs the gap in current guidance literature for ISO27001. ISO27001, the information security management standard (ISMS), is providing a significant challenge for many organisations. One of the key areas of confusion is the relationship between the ISO27001 ISMS project manager and those responsible for implementing the technical controls.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
HF5548.37 .H66 2010 (Browse shelf) https://ezproxy.uttyler.edu/login?url=http://www.jstor.org/stable/10.2307/j.ctt5hh4tx Available ocn670292245

Includes bibliographical references.

INTRODUCTION; CHAPTER 1: INFORMATION AND INFORMATION SECURITY; CHAPTER 2: USING AN ISMS TO COUNTER THE THREATS; CHAPTER 3: AN INTRODUCTION TO ISO27001; CHAPTER 4: IDENTIFY YOUR INFORMATION ASSETS; CHAPTER 5: CONDUCTING A RISK ASSESSMENT; CHAPTER 6: AN OVERVIEW OF MICROSOFT TECHNOLOGIES; CHAPTER 7: IMPLEMENTING ISO27001 IN A MICROSOFT ENVIRONMENT; CHAPTER 8: SECURING THE WINDOWS® ENVIRONMENT; CHAPTER 9: SECURING THE MICROSOFT® WINDOWS SERVER® PLATFORM; CHAPTER 10: AUDITING AND MONITORING; CHAPTER 11: SECURING YOUR SERVERS.

Ideal for project managers, IT and security staff, this book plugs the gap in current guidance literature for ISO27001. ISO27001, the information security management standard (ISMS), is providing a significant challenge for many organisations. One of the key areas of confusion is the relationship between the ISO27001 ISMS project manager and those responsible for implementing the technical controls.

There are no comments on this title.

to post a comment.