Information Security Management Professional based on ISO/IEC 27001 Courseware - English - Ruben Zeegers - ebook119,85
Information security management professional based on ISO/IEC 27001 Coursware - English - Ruben Zeegers - ebook119,85
NieuwInformation security foundation op basis van ISO 27002 courseware - André Smulders - eBook (9789401801812)Dit Courseware pakket bestaat uit twee publicaties, Information Security Foundation op basis van ISO 27002 Courseware () en Basiskennis informatiebeveiliging op basis van ISO27001 en ISO27002 - 2de herziene druk (). In de Information Security modulen van EXIN wordt de definitie van het PvIB (Platform voor Informatiebeveiliging) gebruikt: Informatiebeveiliging betreft het definiëren, implementeren, onderhouden, handhaven en evalueren van een samenhangend stelsel van maatregelen die de beschikbaarheid, de integriteit en de vertrouwelijkheid van de (handmatige en geautomatiseerde) informatievoorziening waarborgen. In deze training, Information Security Foundation based on ISO/IEC 27002 (ISFS), worden basisbegrippen van informatiebeveiliging en hun samenhang getoetst. De basiskennis die in deze module wordt getoetst, draagt vooral bij aan het bewustzijn dat informatie kwetsbaar is en dat maatregelen om informatie te beschermen, nodig zijn. Deze courseware omvat de onderwerpen: * Informatie…77,80
NieuwImplementing information security based on iso 27001/iso 27002 - Alan Calder - eBook (9789401801232)Information is the currency of the information age and in many cases is the most valuable asset possessed by an organisation. Information security management is the discipline that focuses on protecting and securing these assets against the threats of natural disasters, fraud and other criminal activity, user error and system failure. Effective information security can be defined as the 'preservation of confidentiality, integrity and availability of information.' This book describes the approach taken by many organisations to realise these objectives. It discusses how information security cannot be achieved through technological means alone, but should include factors such as the organisation's approach to risk and pragmatic day-to-day business operations. This Management Guide provides an overview of the implementation of an Information Security Management System that conforms to the requirements of ISO/IEC 27001:2005 and which uses controls derived from ISO/IEC 17799:2005. It covers …27,99