pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: ISO27000 AND INFORMATION SECURITY
A COMBINED GLOSSARY
By: Alan Calder, Steve G. Watkins, IT Governance Publishing (Editor)
Format: Paperback

List price: £9.95


We currently do not stock this item, please contact the publisher directly for further information.

ISBN 10: 184928041X
ISBN 13: 9781849280419
Publisher: IT GOVERNANCE PUBLISHING
Pub. date: 30 March, 2010
Pages: 121
Description: This extensive glossary of information security and related terms is not a technical glossary: it is designed to help a manager, or someone new to the subject, identify the meaning of a particular term.
Synopsis: Get to grips with key ISO27000 and information security vocabulary with this indispensable, concise pocket guide! Information security is of crucial importance to your business. If you don t know the difference between a cookie and a worm, or between war-chalking and digital watermarking, you are sure to find this guide enlightening. The strength of the book is that it is a combined glossary, enabling you to find explanations of geek slang, procedural language and acronyms all in one place. The combined glossary is a revised edition of the popular A Dictionary of Information Security Terms, and this new edition has been able to draw on the definitions provided in ISO/IEC 27000:2009 Security Techniques Information security management systems Overview and vocabulary. What's new? Further definitions are sourced from ISO/IEC Guide 73:2002 to provide you with authoritative explanations of those information security terms that are used across the ISO framework. The combined glossary has taken account of an important change on the information security scene, and contains some new acronyms and definitions from the Payment Card Industry Data Security Standard (PCI DSS).Benefits to business include: * Understand what everyone else is talking about The fact that you re reading this suggests you take an interest in information security. Whether you work in business or in the public sector, it s an issue that s likely to come up. If you re given a position paper to read on information security, or have to attend a briefing, you will want to form your own opinion, particularly when the discussion directly affects your company. Meekly accepting arguments you don t understand is never a good idea, especially not when large sums of money are involved. With the clear, reliable definitions contained in this combined glossary, you can finally get to grips with the problem. * Understand what you re talking about Any modern organisation relies on its IT systems. Although IT may not be your speciality, cybercrime affects all of us. So, wherever you work, if you are in a position of responsibility, then at some point, you will need to form a view on information security and put your point across. You can use this combined glossary to bring your arguments into sharper focus.The pocket guide will prove invaluable not only to business executives but also to civil servants and lawyers, as well as to people working in financial services and the media. * Assist ISO implementation If your company or department is introducing an information security management system (ISMS) as specified under ISO27001, then you can ensure that key personnel are up to speed on the issue of information security by giving them all a copy of this pocket guide. * Make better decisions The bad guys are only ever a mouse-click away. If you care at all about the financial well-being of your company, you need to take action on information security. However, there is often a gap between management s overall sense of its responsibilities regarding information security and the IT people whose technical skills are required to fulfil those obligations. This combined glossary will help your organisation to bridge that gap and to facilitate communication between managers and the IT department.The guide enables managers to grasp the key concepts of information security, thereby facilitating the planning and coordination that are essential for successful implementation of any major information security project. So it makes sense to take information security seriously, even if you are not an expert on the subject. This rapidly evolving discipline has spawned a complex and bewildering vocabulary and understanding the terms and language will stand you in good stead. If you have ever felt confused by the language of information security, this pocket guide is for you; designed for non-specialist managers and those who are new to the subject, two internationally recognised experts in the field of information security have created a simple key to the mysteries of geek speak.
Publication: UK
Imprint: IT Governance Publishing
Returns: Non-returnable
Some other items by this author:
21ST CENTURY CHINESE CYBERWARFARE (HB)
30 KEY QUESTIONS THAT UNLOCK MANAGEMENT (PB)
50 TOP IT PROJECT MANAGEMENT CHALLENGES (PB)
A BUSINESS GUIDE TO INFORMATION SECURITY
A BUSINESS GUIDE TO INFORMATION SECURITY (PB)
A GUIDE TO EFFECTIVE INTERNAL MANAGEMENT SYSTEM AUDITS (PB)
A MANAGER'S GUIDE TO ISO22301 (PB)
AGILE (PB)
AGILE GOVERNANCE AND AUDIT (PB)
AGILE PRODUCTIVITY UNLEASHED (PB)
AGILE SAP (PB)
AN INTRODUCTION TO ANTI-BRIBERY MANAGEMENT SYSTEMS (PB)
AN INTRODUCTION TO INFORMATION SECURITY AND ISO 27001 (PB)
AN INTRODUCTION TO INFORMATION SECURITY AND ISO 27001:2013
ASSESSING IT PROJECTS TO ENSURE SUCCESSFUL OUTCOMES (PB)
AVAILABILITY AND CAPACITY MANAGEMENT IN THE CLOUD (PB)
BREAKING THE ADDICTION TO PROCESS (PB)
BUILD A SECURITY CULTURE (PB)
BUSINESS CONTINUITY AND THE PANDEMIC THREAT (PB)
BUSINESS CONTINUITY MANAGEMENT (PB)
BUSINESS MANAGEMENT CONTROLS (PB)
CHANGING THE IT LEADER'S MINDSET (PB)
CLOUD SECURITY AND GOVERNANCE (PB)
COMPLIANCE BY DESIGN (PB)
COMPLIANCE FOR GREEN IT
COMPLIANCE FOR GREEN IT
COMPLIANCE FOR GREEN IT POCKET GUIDE (PB)
COMPUTER FORENSICS (PB)
CONCISE INTRODUCTION TO THE NIS DIRECTIVE - A POCKET GUIDE FOR DIGITAL SERVICE PROVIDERS (PB)
COPING WITH UNPLANNED ABSENCES (PB)
CORPORATE GOVERNANCE
CORPORATE GOVERNANCE (HB)
CRITICAL ISSUES SERIES - CYBER SECURITY (PB)
CYBER ESSENTIALS
CYBER ESSENTIALS (PB)
CYBER RISKS FOR BUSINESS PROFESSIONALS (PB)
CYBER SECURITY HANDBOOK - PREPARE FOR, RESPOND TO AND RECOVER FROM CYBER ATTACKS (PB)
CYBERWAR, CYBERTERROR, CYBERCRIME (PB)
DATA PROTECTION AND THE CLOUD (PB)
DATA PROTECTION COMPLIANCE IN THE UK (PB)
DIRECTING THE AGILE ORGANIZATION (PB)
DISASTER RECOVERY AND BUSINESS CONTINUITY (PB)
E-MAIL SECURITY (PB)
ESSENTIAL TIME MANAGEMENT AND ORGANISATION (PB)
EU CODE OF CONDUCT FOR CLOUD SERVICE PROVIDERS (PB)
EU GDPR & EU-US PRIVACY SHIELD (PB)
EU GDPR (EUROPEAN) SECOND EDITION (PB)
EU GDPR (PB)
EU GDPR (PB)
EU GDPR (PB)
EU GDPR - A POCKET GUIDE, SECOND EDITION (PB)
EU GDPR - AN INTERNATIONAL GUIDE TO COMPLIANCE (PB)
EU GENERAL DATA PROTECTION REGULATION (GDPR) (PB)
EU-DSGVO: EINE KURZANLEITUNG (PB)
EVERYTHING YOU WANT TO KNOW ABOUT AGILE (PB)
EVERYTHING YOU WANT TO KNOW ABOUT BUSINESS CONTINUITY (PB)
EVERYTHING YOU WANT TO KNOW ABOUT ORGANISATIONAL CHANGE (PB)
EXPLODING THE MYTHS SURROUNDING ISO9000 (PB)
FUNDAMENTALS OF INFORMATION RISK MANAGEMENT AUDITING (PB)
GOVERNANCE AND INTERNAL CONTROLS FOR CUTTING EDGE IT (PB)
GOVERNANCE OF ENTERPRISE IT BASED ON COBIT 5 (PB)
GREEN IT IN PRACTICE (PB)
HOW TO USE WEB 2.0 AND SOCIAL NETWORKING SITES SECURELY
HOW TO USE WEB 2.0 AND SOCIAL NETWORKING SITES SECURELY (PB)
I NOVE PASSI PER IL SUCCESSO (PB)
ILLUSTRATING PRINCE2 PROJECT MANAGEMENT IN REAL TERMS (PB)
IMPLEMENTIERUNG VON SERVICE-QUALITA BASIEREND AUF ISO/IEC 20000
IMPLEMENTING INFORMATION SECURITY BASED ON ISO 27001/ISO 27002
IMPLEMENTING INFORMATION SECURITY BASED ON ISO 27001/ISO 27002 (PB)
IMPLEMENTING SERVICE QUALITY BASED ON ISO/IEC 20000 (PB)
IN HINDSIGHT (PB)
INFORMATION SECURITY A PRACTICAL GUIDE (PB)
INFORMATION SECURITY BASED ON ISO 27001/ISO 27002
INFORMATION SECURITY BASED ON ISO 27001/ISO 27002 (PB)
INFORMATION SECURITY BREACHES (PB)
INFORMATION SECURITY RISK MANAGEMENT FOR ISO 27001/ISO27002 (PB)
INFORMATION SECURITY RISK MANAGEMENT FOR ISO270001/ISO27002
INFORMATION SECURITY RISK MANAGEMENT FOR ISO27001/ISO27002
INTEGRATED MEASUREMENT - KPIS AND METRICS FOR ITSM (PB)
INTERNATIONAL IT GOVERNANCE
INTERNATIONAL IT GOVERNANCE (PB)
ISO 19770 SOFTWARE ASSET MANAGEMENT (PB)
ISO 22301:2019 AND BUSINESS CONTINUITY MANAGEMENT - UNDERSTAND HOW TO PLAN, IMPLEMENT AND ENHANCE A BUSINESS CONTINUITY MANAGEMENT SYSTEM (BCMS) (PB)
ISO/IEC 20000 (PB)
ISO/IEC 38500 THE IT GOVERNANCE STANDARD
ISO/IEC 38500 THE IT GOVERNANCE STANDARD (PB)
ISO14001 STEP BY STEP (PB)
ISO22301: A POCKET GUIDE (PB)
ISO27000 AND INFORMATION SECURITY
ISO27001 ASSESSMENT WITHOUT TEARS (PB)
ISO27001/ISO27002
ISO27001/ISO27002
ISO27001/ISO27002
ISO27001/ISO27002 (PB)
ISO27001/ISO27002 (PB)
ISO27001/ISO27002: UN GUIDE DE POCHE (PB)
ISO27001/ISO27002: UNA GUIA DE BOLSILLO (PB)
ISO27001: 2013 ASSESSMENTS WITHOUT TEARS
IT ASSET MANAGEMENT (PB)
IT GOVERNANCE
IT GOVERNANCE
IT GOVERNANCE
IT GOVERNANCE
IT GOVERNANCE
IT GOVERNANCE
IT GOVERNANCE
IT GOVERNANCE
IT GOVERNANCE
IT GOVERNANCE
IT GOVERNANCE (HB)
IT GOVERNANCE (HB)
IT GOVERNANCE (HB)
IT GOVERNANCE (PB)
IT GOVERNANCE (PB)
IT GOVERNANCE POCKET GUIDE (PB)
IT GOVERNANCE TO DRIVE HIGH PERFORMANCE (PB)
IT GOVERNANCE TODAY
IT GOVERNANCE: IMPLEMENTING FRAMEWORKS AND STANDARDS FOR THE CORPORATE GOVERNANCE OF IT
IT GOVERNANCE: IMPLEMENTING FRAMEWORKS AND STANDARDS FOR THE CORPORATE GOVERNANCE OF IT (PB)
IT INDUCTION AND INFORMATION SECURITY AWARENESS: A POCKET GUIDE (PB)
IT PROJECT MANAGEMENT (PB)
IT REGULATORY COMPLIANCE IN NORTH AMERICA
IT REGULATORY COMPLIANCE IN NORTH AMERICA
IT REGULATORY COMPLIANCE IN NORTH AMERICA (PB)
IT REGULATORY COMPLIANCE IN THE UK
IT REGULATORY COMPLIANCE IN THE UK
IT REGULATORY COMPLIANCE IN THE UK (PB)
IT STRATEGIC AND OPERATIONAL CONTROLS (PB)
IT'S ALL ABOUT RELATIONSHIPS
ITIL AND ORGANIZATIONAL CHANGE (PB)
ITIL FOUNDATION ESSENTIALS (PB)
ITIL LIFECYCLE ESSENTIALS (PB)
JAMES MACLAREN (HB)
MANAGING BUSINESS TRANSFORMATION (PB)
MANAGING INFORMATION SECURITY BREACHES (PB)
MEASURING YOUR IT (PB)
NETWORK AND INFORMATION SYSTEMS (NIS) REGULATIONS - A POCKET GUIDE FOR DIGITAL SERVICE PROVIDERS (PB)
NETWORK AND INFORMATION SYSTEMS (NIS) REGULATIONS - A POCKET GUIDE FOR OPERATORS OF ESSENTIAL SERVICES (PB)
NEUF ETAPES VERS LE SUCCES (PB)
NINE STEPS TO SUCCESS
NINE STEPS TO SUCCESS
NINE STEPS TO SUCCESS (PB)
NINE STEPS TO SUCCESS - NORTH AMERICAN E (PB)
NINE STEPS TO SUCCESS: AN ISO 27001 IMPLEMENTATION OVERVIEW (PB)
NIST CYBERSECURITY FRAMEWORK (PB)
NUEVE PASOS PARA EL EXITO (PB)
OHSAS 18001 STEP BY STEP (PB)
OILSEED RAPE AND BEES (PB)
ONCE MORE UNTO THE BREACH: MANAGING INFORMATION SECURITY IN AN UNCERTAIN WORLD (PB)
PCI DSS (PB)
PCI DSS A POCKET GUIDE (PB)
PCI DSS A PRACTICAL GUIDE TO IMPLEMENTING AND MAINTAINING COMPLIANCE (PB)
PCI DSS: A POCKET GUIDE
PCI DSS: A POCKET GUIDE (PB)
PENETRATION TESTING (PB)
PRAGMATIC APPLICATION OF SERVICE MANAGEMENT (PB)
PROJECT GOVERNANCE (PB)
RANSOMWARE THREAT LANDSCAPE
REGLAMENTO GENERAL DE PROTECCION DE DATOS (RGPD) DE LA UE (PB)
RELEASE AND DEPLOYMENT (PB)
RESILIENT THINKING (PB)
REVIEWING IT IN DUE DILIGENCE (PB)
RGPD UE (PB)
RISK ASSESSMENT FOR ASSET OWNERS
RISK ASSESSMENT FOR ASSET OWNERS
RISK ASSESSMENT FOR ASSET OWNERS (PB)
SECURING CLOUD SERVICES (PB)
SECURITY (PB)
SELECTION MANAGEMENT FOR SYSTEMS AND SERVICES (PB)
SELLING INFORMATION SECURITY TO THE BOARD
SELLING INFORMATION SECURITY TO THE BOARD (PB)
SELLING INFORMATION SECURITY TO THE BOARD (PB)
SERVICE LEVEL AGREEMENTS (PB)
SHAREPOINT GOVERNANCE TOOLKIT (CD)
SOCIALMEDIA TOOLKIT (CD)
SOFTWARE LIFE CYCLE MANAGEMENT STANDARDS (PB)
SWANSON ON INTERNAL AUDITING (PB)
TEN RULES OF INFORMATION SECURITY FOR THE SMALLER BUSINESS
TEN RULES OF INFORMATION SECURITY FOR THE SMALLER BUSINESS (PB)
TEN STEPS TO ITSM SUCCESS (PB)
THE CASE FOR ISO 27001 (PB)
THE CASE FOR ISO27001
THE CASE FOR ISO27001: 2013
THE CHIEF INFORMATION SECURITY OFFICER (PB)
THE CONCISE PRINCE2 (PB)
THE DEFINITIVE GUIDE TO IT SERVICE METRICS (PB)
THE GREEN AGENDA
THE GREEN AGENDA
THE GREEN AGENDA (PB)
THE GREEN OFFICE
THE GREEN OFFICE (PB)
THE INTERNET HIGHWAY CODE
THE ITSM IRON TRIANGLE (PB)
THE NON-GEEK GUIDE TO WIRELESS SECURITY
THE POWER OF THE AGILE BUSINESS ANALYST (PB)
THE PSYCHOLOGY OF INFORMATION SECURITY (PB)
THE QUANTUM AGE OF IT (PB)
THE SECURITY CONSULTANT'S HANDBOOK (PB)
THE TAO OF OPEN SOURCE INTELLIGENCE (PB)
THE TRUE COST OF INFORMATION SECURITY BREACHES AND CYBER CRIME (PB)

TOP SELLERS IN THIS CATEGORY
Data Driven Security (Paperback)
John Wiley & Sons Inc
Our Price : £34.19
more details
Official (ISC)2 Guide to the CISSP CBK (Hardback)
Apple Academic Press Inc.
Our Price : £59.39
more details
Web Application Security ()
O''Reilly Media
Our Price : £38.68
more details
BTEC Nationals Information Technology (Mixed media product)
Pearson Education Limited
Our Price : £29.84
more details
The Art of Deception (Paperback)
John Wiley & Sons Inc
Our Price : £7.30
more details
BROWSE FOR BOOKS IN RELATED CATEGORIES
 COMPUTING AND INFORMATION TECHNOLOGY
 computer communications & networking
 network security


Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 

NEW
Ramadan and Eid al-Fitr A celebratory, inclusive and educational exploration of Ramadan and Eid al-Fitr for both children that celebrate and children who want to understand and appreciate their peers who do.
add to basket

Learning
That''s My Story!: Drama for Confidence, Communication and C... The ability to communicate is an essential life skill for all children, underpinning their confidence, personal and social wellbeing, and sense of self.
add to basket