14% found this document useful (7 votes)
4K views2 pages

A Comprehensive Book On InformationSystemsSecurityByNinaGodbole

This will help readers reach and procure one of the most comprehensive book on the topic of Information Systems Security with coverage of Data Privacy too.

Uploaded by

Nina S. Godbole
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
14% found this document useful (7 votes)
4K views2 pages

A Comprehensive Book On InformationSystemsSecurityByNinaGodbole

This will help readers reach and procure one of the most comprehensive book on the topic of Information Systems Security with coverage of Data Privacy too.

Uploaded by

Nina S. Godbole
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

New release from Wiley India

INFORMATION SYSTEMS SECURITY


Security Management,
Metrics, Frameworks
and Best Practices

Nina Godbole

Price: Rs. 549/-


Pages: 1020

ISBN 13: 978-81-265-1692-6

Companion CD contains:

• 37 appendices with checklists,


guidelines and more, on the
topics covered.
• 17 case illustrations to help
readers appreciate/reinforce
the understanding of the
concepts.
• Workshop Mapping document
with ideas for mapping
contents of chapters to a
workshops/seminars on
security and privacy.
KEY ATTRIBUTES

v
Written by an experienced industry professional working in the domain, a
professional with extensive experience in teaching at various levels (student
seminars, industry workshops) as well as research.
v
A comprehensive treatment and truly a treatise on the subject of Information Security
v
Covers SOX and SAS 70 aspects for Asset Management in the context of
Information Systems Security.
v
Detailed explanation of topics "Privacy" and "Biometric Controls".
v
IT Risk Analysis covered.
v
Review questions and reference material pointers after each chapter.
v
Well-illustrated diagrams to help understand the key concepts.
v
Useful for candidates appearing for the CISA certification exam.
v
Maps well with the CBOK for CSTE and CSQA Certifications.

For further information please contact


Email: [email protected]
Table of Contents
Chapter 1: Information Systems in Global Context
Chapter 2: Threats to Information Systems
Chapter 3: Security Considerations in Mobile and Wireless Computing
Chapter 4: Information Security Management in Organizations
Chapter 5: Building Blocks of Information Security
Chapter 6: Information Security Risk Analysis
Chapter 7: Overview of Physical Security for Information Systems
Chapter 8: Perimeter Security for Physical Protection
Chapter 9: Biometrics Controls for Security
Chapter 10: Biometrics-Based Security: Issues and Challenges
Chapter 11: Network Security in Perspective
Chapter 12: Networking and Digital Communication Fundamentals
Chapter 13: Cryptography and Encryption
Chapter 14: Intrusion Detection for Securing the Networks
Chapter 15: Firewalls for Network Protection
Chapter 16: Virtual Private Networks for Security
Chapter 17: Security of Wireless Networks
Chapter 18: Business Applications Security: An EAI Perspective
Chapter 19: Security of Electronic Mail Systems
Chapter 20: Security of Databases
Chapter 21: Security of Operating Systems
Chapter 22: Security Models, Frameworks, Standards and Methodologies
Chapter 23: ISO 17799/ISO 27001
Chapter 24: Systems Security Engineering Capability Maturity Model – The SSE-CMM
Chapter 25: COBIT, COSO-ERM and SAS 70
Chapter 26: Information Security: Other Models and Methodologies
Chapter 27: Laws and Legal Framework for Information Security
Chapter 28: Security Metrics
Chapter 29: Privacy – Fundamental Concepts and Principles
Chapter 30: Privacy – Business Challenges
Chapter 31: Privacy – Technological Impacts
Chapter 32: Web Services and Privacy
Chapter 33: Staffing the Security Function
Chapter 34: Business Continuity and Disaster Recovery Planning
Chapter 35: Auditing for Security
Chapter 36: Privacy Best Practices in Organizations
Chapter 37: Asset Management
Chapter 38: Ethical Issues and Intellectual Property Concerns for InfoSec Professionals

Wiley India Pvt. Ltd.,


HEAD OFFICE: 4435-36/7, Ansari Road, Daryaganj, New Delhi-110002. Tel: 91-11-43630000 Fax: 91-11-23275895. Email: [email protected]
BANGALORE: Tel: 080-23132383, 9341262124. Telefax: 080-23124319. Email: [email protected]
MUMBAI: Tel: 022-27889263, 27889272. Telefax: 022-27889263. Email: [email protected]
www.wileyindia.com

You might also like