๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Information technology. Security techniques. Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1


Leaves
50
Category
Scientific

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


ISO/IEC 27003:2010, Information technolo
โœ ISO/IEC/JTC 1/SC 27 ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐Ÿ› Multiple. Distributed through American National St ๐ŸŒ English

ISO/IEC 27003:2010 focuses on the critical aspects needed for successful design and implementation of an Information Security Management System (ISMS) in accordance with ISO/IEC 27001:2005. It describes the process of ISMS specification and design from inception to the production of implementation p

[ISO/IEC 27701:2019] Security techniques
โœ ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› ISO, IEC ๐ŸŒ English

This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization