Get Free Shipping on orders over $79
Implementing an Information Security Management System : Security Management Based on ISO 27001 Guidelines - Abhishek Chopra

Implementing an Information Security Management System

Security Management Based on ISO 27001 Guidelines

By: Abhishek Chopra, Mukund Chaudhary

eText | 9 December 2019

At a Glance

eText


$89.00

or 4 interest-free payments of $22.25 with

 or 

Instant online reading in your Booktopia eTextbook Library *

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You'll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation, post-implementation, and during monitoring of the implemented controls. Implementing an Information Security Management System provides implementation guidelines for ISO 27001:2013 to protect your information assets and ensure a safer enterprise environment.

This book is a step-by-step guide on implementing secure ISMS for your organization. It will change the way you interpret and implement information security in your work area or organization.

What You Will Learn

  • Discover information safeguard methods
  • Implement end-to-end information security
  • Manage risk associated with information security
  • Prepare for audit with associated roles and responsibilities
  • Identify your information risk
  • Protect your information assets

Who This Book Is For

Security professionals who implement and manage a security framework or security controls within their organization. This book can also be used by developers with a basic knowledge of security concepts to gain a strong understanding of security standards for an enterprise.

on
Desktop
Tablet
Mobile

More in Data Encryption