View
213
Download
0
Category
Preview:
Citation preview
8/18/2019 22017375 a Comprehensive Book on InformationSystemsSecurityByNinaGodbole
1/2
Written by an experienced industry professional working in the domain, aprofessional with extensive experience in teaching at various levels (student
seminars, industry workshops) as well as research. A comprehensive treatment and truly a treatise on the subject of Information SecurityCovers SOX and SAS 70 aspects for Asset Management in the context ofInformation Systems Security.Detailed explanation of topics "Privacy" and "Biometric Controls".IT Risk Analysis covered.Review questions and reference material pointers after each chapter.Well-illustrated diagrams to help understand the key concepts.Useful for candidates appearing for the CISA certification exam.Maps well with the CBOK for CSTE and CSQA Certifications.
ISBN 13: 978-81-265-1692-6
Price: Rs. 549/-Pages: 1020
Nina Godbole
INFORMATION SYSTEMS SECURITYSecurity Management,Metrics, Frameworks
and Best Practices
New release from Wiley India
KEY ATTRIBUTESKEY ATTRIBUTES
For further information please contact
Email: acadmktg@wileyindia.com
•
•
37 appendices with checklists,guidelines and more, on thetopics covered.
17 case illustrations to helpreaders appreciate/reinforcethe understanding of theconcepts.
Workshop Mapping documentwith ideas for mappingcontents of chapters to aworkshops/seminars onsecurity and privacy.
•
Companion CD contains:
8/18/2019 22017375 a Comprehensive Book on InformationSystemsSecurityByNinaGodbole
2/2
Table of Contents
Chapter 1: Information Systems in Global Context
Chapter 2: Threats to Information Systems
Chapter 3: Security Considerations in Mobile and Wireless Computing
Chapter 4: Information Security Management in Organizations
Chapter 5: Building Blocks of Information Security
Chapter 6: Information Security Risk Analysis
Chapter 7: Overview of Physical Security for Information Systems
Chapter 8: Perimeter Security for Physical Protection
Chapter 9: Biometrics Controls for Security
Chapter 10: Biometrics-Based Security: Issues and Challenges
Chapter 11: Network Security in Perspective
Chapter 12: Networking and Digital Communication Fundamentals
Chapter 13: Cryptography and EncryptionChapter 14: Intrusion Detection for Securing the Networks
Chapter 15: Firewalls for Network Protection
Chapter 16: Virtual Private Networks for Security
Chapter 17: Security of Wireless Networks
Chapter 18: Business Applications Security: An EAI Perspective
Chapter 19: Security of Electronic Mail Systems
Chapter 20: Security of Databases
Chapter 21: Security of Operating Systems
Chapter 22: Security Models, Frameworks, Standards and MethodologiesChapter 23: ISO 17799/ISO 27001
Chapter 24: Systems Security Engineering Capability Maturity Model – The SSE-CMM
Chapter 25: COBIT, COSO-ERM and SAS 70
Chapter 26: Information Security: Other Models and Methodologies
Chapter 27: Laws and Legal Framework for Information Security
Chapter 28: Security Metrics
Chapter 29: Privacy – Fundamental Concepts and Principles
Chapter 30: Privacy – Business Challenges
Chapter 31: Privacy – Technological Impacts
Chapter 32: Web Services and Privacy
Chapter 33: Staffing the Security Function
Chapter 34: Business Continuity and Disaster Recovery Planning
Chapter 35: Auditing for Security
Chapter 36: Privacy Best Practices in Organizations
Chapter 37: Asset Management
Chapter 38: Ethical Issues and Intellectual Property Concerns for InfoSec Professionals
HEAD OFFICE: 4435-36/7, Ansari Road, Daryaganj, New Delhi-110002. Tel: 91-11-43630000 Fax: 91-11-23275895. Email: csupport@wileyindia.comBANGALORE: Tel: 080-23132383, 9341262124. Telefax: 080-23124319. Email: blrsales@wileyindia.com
MUMBAI: Tel: 022-27889263, 27889272. Telefax: 022-27889263. Email: mumsales@wileyindia.comwww.wileyindia.com
Wiley India Pvt. Ltd.,
Recommended