LEADER 00951nam0-2200349---450 001 990009601660403321 005 20200203121421.0 010 $a978-0-07-162358-2 035 $a000960166 035 $aFED01000960166 035 $a(Aleph)000960166FED01 035 $a000960166 100 $a20120705d2010----km-y0itay50------ba 101 0 $aeng 102 $aUS 105 $a--------001yy 200 1 $aQuantum mechanics$fYoav Peleg ... [et al.] 205 $a2nd ed. 210 $aNew York$cMcGraw-Hill$dc2010 215 $a355 p.$d28 cm 225 1 $aSchaum's outlines series 610 0 $aMeccanica quantistica 676 $a530.12076$v22$zita 702 1$aPeleg,$bYoav 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990009601660403321 952 $a60 530.120 PELY 2010$b13925$fFAGBC 952 $a60 530.120 PELY 2010 BIS$b13926$fFAGBC 959 $aFAGBC 996 $aQuantum Mechanics$9342383 997 $aUNINA LEADER 02062nam 2200409 450 001 9910820143003321 005 20210209225927.0 010 $a1-78778-053-8 035 $a(CKB)4100000007821485 035 $a(Au-PeEL)EBL5796947 035 $a(OCoLC)1112424139 035 $a(MiAaPQ)EBC5796947 035 $a(EXLCZ)994100000007821485 100 $a20190822d2018 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aNetwork and Information Systems (NIS) Regulations $ea pocket guide for operators of essential services /$fAlan Calder 210 1$aEly, England :$cIT Governance Publishing,$d[2018] 210 4$dİ2018 215 $a1 online resource (64 pages) 311 $a1-78778-052-X 327 $aCover -- Title -- About the Author -- Contents -- Introduction -- Background -- A note on Brexit -- Guidance -- Key definitions -- Chapter 1: Scope and applicability -- Digital service providers -- Chapter 2: Authorities and bodies -- Competent authorities -- CSIRTs -- Single points of contact -- Cooperation Group -- Powers and penalties -- Chapter 3: Complying with the Directive -- Cyber security objectives -- Principles -- Cyber Assessment Framework -- Notifications -- Chapter 4: Implementing cyber resilience -- ISO 27001 and ISO 27002 -- ISO 22301 -- ISO 27035 -- Combining standards -- Appendix: OES Definitions and Thresholds -- Further reading. 330 $aThis pocket guide is a primer for any OES (operators of essential services) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them. 606 $aComputer security$vHandbooks, manuals, etc 615 0$aComputer security 676 $a005.8 700 $aCalder$b Alan$f1957-$0881141 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910820143003321 996 $aNetwork and Information Systems (NIS) Regulations$93921377 997 $aUNINA