pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: THE CASE FOR ISO 27001
By: Alan Calder, IT Governance Publishing (Editor)
Format: Paperback

List price: £24.95


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 1849285306
ISBN 13: 9781849285308
Publisher: IT GOVERNANCE PUBLISHING
Pub. date: 28 November, 2013
Edition: 2nd edition
Pages: 121
Description: This guide, updated to reflect ISO27001:2013, presents the compelling business case for implementing ISO27001 in order to protect your information assets.
Synopsis: What do you do to keep your business information secure? Information and information systems are vital to every organisation. Our reliance on data and information, and the fact that it is so easy to share, means that everyone is at risk of cyber attack from hackers, viruses, online fraudsters, malicious insiders, or even from simple human error. Manage cyber threat To counter these threats you have to identify the real information risks your business faces, then you need to find the most appropriate way to mitigate such risks. Adopting the ISO27001 Standard will give your organisation a reliable framework for creating an information security management system. The business case for investing in information security This friendly guide, updated to reflect ISO27001:2013, presents the compelling business case for implementing ISO27001 in order to protect your information assets. This makes it ideal reading for anyone unfamiliar with the many benefits of the standard, and as a supporting document for an ISO27001 project proposal.Understand ISO27001 and learn how your organisation can: *Fight cybercrime - Introducing the ISO 27001 information security management system will help protect your business from the threat of organised crime. *Combat cyber-terror - Terrorist organisations now work with computers as well as explosives. Introducing an information security management system makes it easier to defend your company from a destructive cyber-attack. *Improve your corporate governance - Reducing your company's financial exposure to the risk of losses resulting from IT system failure is now a corporate governance requirement. ISO 27001 will help you to comply. *Recover from accidents - With ISO 27001, you can minimise the risk that your information will be lost or corrupted as a result of human error. Read this book to learn how ISO27001 secures your information assets and protects your business.
Illustrations: black & white illustrations
Publication: UK
Imprint: IT Governance Publishing
Returns: Non-returnable
Some other items by this author:
21ST CENTURY CHINESE CYBERWARFARE (HB)
30 KEY QUESTIONS THAT UNLOCK MANAGEMENT (PB)
50 TOP IT PROJECT MANAGEMENT CHALLENGES (PB)
A BUSINESS GUIDE TO INFORMATION SECURITY
A BUSINESS GUIDE TO INFORMATION SECURITY (PB)
A GUIDE TO EFFECTIVE INTERNAL MANAGEMENT SYSTEM AUDITS (PB)
A MANAGER'S GUIDE TO ISO22301 (PB)
AGILE (PB)
AGILE GOVERNANCE AND AUDIT (PB)
AGILE PRODUCTIVITY UNLEASHED (PB)
AGILE SAP (PB)
AN INTRODUCTION TO ANTI-BRIBERY MANAGEMENT SYSTEMS (PB)
AN INTRODUCTION TO INFORMATION SECURITY AND ISO 27001 (PB)
ASSESSING IT PROJECTS TO ENSURE SUCCESSFUL OUTCOMES (PB)
AVAILABILITY AND CAPACITY MANAGEMENT IN THE CLOUD (PB)
BREAKING THE ADDICTION TO PROCESS (PB)
BUILD A SECURITY CULTURE (PB)
BUSINESS CONTINUITY AND THE PANDEMIC THREAT (PB)
BUSINESS CONTINUITY MANAGEMENT (PB)
BUSINESS MANAGEMENT CONTROLS (PB)
CHANGING THE IT LEADER'S MINDSET (PB)
CLOUD SECURITY AND GOVERNANCE (PB)
COMPLIANCE BY DESIGN (PB)
COMPLIANCE FOR GREEN IT
COMPLIANCE FOR GREEN IT
COMPLIANCE FOR GREEN IT POCKET GUIDE (PB)
COMPUTER FORENSICS (PB)
CONCISE INTRODUCTION TO THE NIS DIRECTIVE - A POCKET GUIDE FOR DIGITAL SERVICE PROVIDERS (PB)
COPING WITH UNPLANNED ABSENCES (PB)
CORPORATE GOVERNANCE
CORPORATE GOVERNANCE (HB)
CRITICAL ISSUES SERIES - CYBER SECURITY (PB)
CYBER ESSENTIALS
CYBER ESSENTIALS (PB)
CYBER RISKS FOR BUSINESS PROFESSIONALS (PB)
CYBER SECURITY HANDBOOK - PREPARE FOR, RESPOND TO AND RECOVER FROM CYBER ATTACKS (PB)
CYBERWAR, CYBERTERROR, CYBERCRIME (PB)
DATA PROTECTION AND THE CLOUD (PB)
DATA PROTECTION COMPLIANCE IN THE UK (PB)
DIRECTING THE AGILE ORGANIZATION (PB)
DISASTER RECOVERY AND BUSINESS CONTINUITY (PB)
E-MAIL SECURITY (PB)
ESSENTIAL TIME MANAGEMENT AND ORGANISATION (PB)
EU CODE OF CONDUCT FOR CLOUD SERVICE PROVIDERS (PB)
EU GDPR & EU-US PRIVACY SHIELD (PB)
EU GDPR (EUROPEAN) SECOND EDITION (PB)
EU GDPR (PB)
EU GDPR (PB)
EU GDPR (PB)
EU GDPR - A POCKET GUIDE, SECOND EDITION (PB)
EU GDPR - AN INTERNATIONAL GUIDE TO COMPLIANCE (PB)
EU GENERAL DATA PROTECTION REGULATION (GDPR) (PB)
EU-DSGVO: EINE KURZANLEITUNG (PB)
EVERYTHING YOU WANT TO KNOW ABOUT AGILE (PB)
EVERYTHING YOU WANT TO KNOW ABOUT BUSINESS CONTINUITY (PB)
EVERYTHING YOU WANT TO KNOW ABOUT ORGANISATIONAL CHANGE (PB)
EXPLODING THE MYTHS SURROUNDING ISO9000 (PB)
FUNDAMENTALS OF INFORMATION RISK MANAGEMENT AUDITING (PB)
GOVERNANCE AND INTERNAL CONTROLS FOR CUTTING EDGE IT (PB)
GOVERNANCE OF ENTERPRISE IT BASED ON COBIT 5 (PB)
GREEN IT IN PRACTICE (PB)
HOW TO USE WEB 2.0 AND SOCIAL NETWORKING SITES SECURELY
HOW TO USE WEB 2.0 AND SOCIAL NETWORKING SITES SECURELY (PB)
I NOVE PASSI PER IL SUCCESSO (PB)
ILLUSTRATING PRINCE2 PROJECT MANAGEMENT IN REAL TERMS (PB)
IMPLEMENTIERUNG VON SERVICE-QUALITA BASIEREND AUF ISO/IEC 20000
IMPLEMENTING INFORMATION SECURITY BASED ON ISO 27001/ISO 27002
IMPLEMENTING INFORMATION SECURITY BASED ON ISO 27001/ISO 27002 (PB)
IMPLEMENTING SERVICE QUALITY BASED ON ISO/IEC 20000 (PB)
IN HINDSIGHT (PB)
INFORMATION SECURITY A PRACTICAL GUIDE (PB)
INFORMATION SECURITY BASED ON ISO 27001/ISO 27002
INFORMATION SECURITY BASED ON ISO 27001/ISO 27002 (PB)
INFORMATION SECURITY BREACHES (PB)
INFORMATION SECURITY RISK MANAGEMENT FOR ISO 27001/ISO27002 (PB)
INFORMATION SECURITY RISK MANAGEMENT FOR ISO270001/ISO27002
INFORMATION SECURITY RISK MANAGEMENT FOR ISO27001/ISO27002
INTEGRATED MEASUREMENT - KPIS AND METRICS FOR ITSM (PB)
INTERNATIONAL IT GOVERNANCE
INTERNATIONAL IT GOVERNANCE (PB)
ISO 19770 SOFTWARE ASSET MANAGEMENT (PB)
ISO 22301:2019 AND BUSINESS CONTINUITY MANAGEMENT - UNDERSTAND HOW TO PLAN, IMPLEMENT AND ENHANCE A BUSINESS CONTINUITY MANAGEMENT SYSTEM (BCMS) (PB)
ISO/IEC 20000 (PB)
ISO/IEC 38500 THE IT GOVERNANCE STANDARD
ISO/IEC 38500 THE IT GOVERNANCE STANDARD (PB)
ISO14001 STEP BY STEP (PB)
ISO22301: A POCKET GUIDE (PB)
ISO27000 AND INFORMATION SECURITY
ISO27000 AND INFORMATION SECURITY (PB)
ISO27001 ASSESSMENT WITHOUT TEARS (PB)
ISO27001/ISO27002
ISO27001/ISO27002
ISO27001/ISO27002
ISO27001/ISO27002 (PB)
ISO27001/ISO27002 (PB)
ISO27001/ISO27002: UN GUIDE DE POCHE (PB)
ISO27001/ISO27002: UNA GUIA DE BOLSILLO (PB)
IT ASSET MANAGEMENT (PB)
IT GOVERNANCE
IT GOVERNANCE
IT GOVERNANCE
IT GOVERNANCE
IT GOVERNANCE
IT GOVERNANCE
IT GOVERNANCE
IT GOVERNANCE
IT GOVERNANCE
IT GOVERNANCE
IT GOVERNANCE (HB)
IT GOVERNANCE (HB)
IT GOVERNANCE (HB)
IT GOVERNANCE (PB)
IT GOVERNANCE (PB)
IT GOVERNANCE POCKET GUIDE (PB)
IT GOVERNANCE TO DRIVE HIGH PERFORMANCE (PB)
IT GOVERNANCE TODAY
IT GOVERNANCE: IMPLEMENTING FRAMEWORKS AND STANDARDS FOR THE CORPORATE GOVERNANCE OF IT
IT GOVERNANCE: IMPLEMENTING FRAMEWORKS AND STANDARDS FOR THE CORPORATE GOVERNANCE OF IT (PB)
IT INDUCTION AND INFORMATION SECURITY AWARENESS: A POCKET GUIDE (PB)
IT PROJECT MANAGEMENT (PB)
IT REGULATORY COMPLIANCE IN NORTH AMERICA
IT REGULATORY COMPLIANCE IN NORTH AMERICA
IT REGULATORY COMPLIANCE IN NORTH AMERICA (PB)
IT REGULATORY COMPLIANCE IN THE UK
IT REGULATORY COMPLIANCE IN THE UK
IT REGULATORY COMPLIANCE IN THE UK (PB)
IT STRATEGIC AND OPERATIONAL CONTROLS (PB)
IT'S ALL ABOUT RELATIONSHIPS
ITIL AND ORGANIZATIONAL CHANGE (PB)
ITIL FOUNDATION ESSENTIALS (PB)
ITIL LIFECYCLE ESSENTIALS (PB)
JAMES MACLAREN (HB)
MANAGING BUSINESS TRANSFORMATION (PB)
MANAGING INFORMATION SECURITY BREACHES (PB)
MEASURING YOUR IT (PB)
NETWORK AND INFORMATION SYSTEMS (NIS) REGULATIONS - A POCKET GUIDE FOR DIGITAL SERVICE PROVIDERS (PB)
NETWORK AND INFORMATION SYSTEMS (NIS) REGULATIONS - A POCKET GUIDE FOR OPERATORS OF ESSENTIAL SERVICES (PB)
NEUF ETAPES VERS LE SUCCES (PB)
NINE STEPS TO SUCCESS
NINE STEPS TO SUCCESS
NINE STEPS TO SUCCESS (PB)
NINE STEPS TO SUCCESS - NORTH AMERICAN E (PB)
NINE STEPS TO SUCCESS: AN ISO 27001 IMPLEMENTATION OVERVIEW (PB)
NIST CYBERSECURITY FRAMEWORK (PB)
NUEVE PASOS PARA EL EXITO (PB)
OHSAS 18001 STEP BY STEP (PB)
OILSEED RAPE AND BEES (PB)
ONCE MORE UNTO THE BREACH: MANAGING INFORMATION SECURITY IN AN UNCERTAIN WORLD (PB)
PCI DSS (PB)
PCI DSS A POCKET GUIDE (PB)
PCI DSS A PRACTICAL GUIDE TO IMPLEMENTING AND MAINTAINING COMPLIANCE (PB)
PCI DSS: A POCKET GUIDE
PCI DSS: A POCKET GUIDE (PB)
PENETRATION TESTING (PB)
PRAGMATIC APPLICATION OF SERVICE MANAGEMENT (PB)
PROJECT GOVERNANCE (PB)
RANSOMWARE THREAT LANDSCAPE
REGLAMENTO GENERAL DE PROTECCION DE DATOS (RGPD) DE LA UE (PB)
RELEASE AND DEPLOYMENT (PB)
RESILIENT THINKING (PB)
REVIEWING IT IN DUE DILIGENCE (PB)
RGPD UE (PB)
RISK ASSESSMENT FOR ASSET OWNERS
RISK ASSESSMENT FOR ASSET OWNERS
RISK ASSESSMENT FOR ASSET OWNERS (PB)
SECURING CLOUD SERVICES (PB)
SECURITY (PB)
SELECTION MANAGEMENT FOR SYSTEMS AND SERVICES (PB)
SELLING INFORMATION SECURITY TO THE BOARD
SELLING INFORMATION SECURITY TO THE BOARD (PB)
SELLING INFORMATION SECURITY TO THE BOARD (PB)
SERVICE LEVEL AGREEMENTS (PB)
SHAREPOINT GOVERNANCE TOOLKIT (CD)
SOCIALMEDIA TOOLKIT (CD)
SOFTWARE LIFE CYCLE MANAGEMENT STANDARDS (PB)
SWANSON ON INTERNAL AUDITING (PB)
TEN RULES OF INFORMATION SECURITY FOR THE SMALLER BUSINESS
TEN RULES OF INFORMATION SECURITY FOR THE SMALLER BUSINESS (PB)
TEN STEPS TO ITSM SUCCESS (PB)
THE CASE FOR ISO27001
THE CASE FOR ISO27001: 2013
THE CHIEF INFORMATION SECURITY OFFICER (PB)
THE CONCISE PRINCE2 (PB)
THE DEFINITIVE GUIDE TO IT SERVICE METRICS (PB)
THE GREEN AGENDA
THE GREEN AGENDA
THE GREEN AGENDA (PB)
THE GREEN OFFICE
THE GREEN OFFICE (PB)
THE INTERNET HIGHWAY CODE
THE ITSM IRON TRIANGLE (PB)
THE NON-GEEK GUIDE TO WIRELESS SECURITY
THE POWER OF THE AGILE BUSINESS ANALYST (PB)
THE PSYCHOLOGY OF INFORMATION SECURITY (PB)
THE QUANTUM AGE OF IT (PB)
THE SECURITY CONSULTANT'S HANDBOOK (PB)
THE TAO OF OPEN SOURCE INTELLIGENCE (PB)
THE TRUE COST OF INFORMATION SECURITY BREACHES AND CYBER CRIME (PB)
THREAT 2.0
TURNING HEADS AND CHANGING MINDS (PB)

TOP SELLERS IN THIS CATEGORY
Data Driven Security (Paperback)
John Wiley & Sons Inc
Our Price : £34.19
more details
The Art of Deception (Paperback)
John Wiley & Sons Inc
Our Price : £7.30
more details
The Art of Invisibility (Paperback)
Little, Brown & Company
Our Price : £12.74
more details
Wireshark 101 (Paperback / softback)
Laura Chappell University
Our Price : £40.95
more details
The Network Security Test Lab (Paperback)
John Wiley & Sons Inc
Our Price : £35.10
more details
BROWSE FOR BOOKS IN RELATED CATEGORIES
 COMPUTING AND INFORMATION TECHNOLOGY
 computer communications & networking
 network security


Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 






Early Learning
Little Worried Caterpillar (PB) Little Green knows she''s about to make a big change - transformingfrom a caterpillar into a beautiful butterfly. Everyone is VERYexcited! But Little Green is VERY worried. What if being a butterflyisn''t as brilliant as everyone says?Join Little Green as she finds her own path ... with just a littlehelp from her friends.
add to basket

Early Learning
add to basket

Picture Book
All the Things We Carry PB What can you carry?A pebble? A teddy? A bright red balloon? A painting you''ve made?A hope or a dream?This gorgeous, reassuring picture book celebrates all the preciousthings we can carry, from toys and treasures to love and hope. With comforting rhymes and fabulous illustrations, this is a warmhug of a picture book.
add to basket