售 价:¥
温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印
为你推荐
COVER
ABOUT THE AUTHOR
PREFACE
ACKNOWLEDGMENTS
1 INTRODUCTION
1.1 Who should read this book?
1.2 What this book is not
1.3 ISO 27001 vs. ISO 27002
1.4 The crucial link between risk management and security controls
1.5 Information security vs. IT security
1.6 ISO 27001 puts it all together
1.7 Additional resources
2 OVERVIEW OF ANNEX A CONTROLS
2.1 Introduction to ISO 27001 Annex A
2.2 Structure of Annex A
2.3 Structuring the documentation for Annex A
2.4 Information security policies (A.5)
2.5 Organization of information security (A.6)
2.6 Human resources security (A.7)
2.7 Asset management (A.8)
2.8 Access control (A.9)
2.9 Cryptography (A.10)
2.10 Physical and environmental security (A.11)
2.11 Operational security (A.12)
2.12 Communications security (A.13)
2.13 System acquisition, development and maintenance (A.14)
2.14 Supplier relationships (A.15)
2.15 Information security incident management (A.16)
2.16 Information security aspects of business continuity management (A.17)
2.17 Compliance (A.18)
2.18 Success factors
3 ISO 27001 MINI CASE STUDIES
3.1 Applying secure engineering principles in a software development company
3.2 Awareness raising in a government agency
3.3 Listing laws, regulations and other requirements in a European bank
3.4 Writing the information security policies in a manufacturing company
3.5 Implementing ISO 27001 in data centers – An interview
GLOSSARY
BIBLIOGRAPHY
买过这本书的人还买过
读了这本书的人还在读
同类图书排行榜