0% found this document useful (0 votes)
497 views4 pages

InformationSystemsSecurityByNinaGodbole Good Read

This document provides information about a new book release from Wiley India titled "Information Systems Security: Security Management, Metrics, Frameworks and Best Practices" by Nina Godbole. The book contains 1020 pages and a companion CD. It covers topics such as information security management, risk analysis, network security, cryptography, privacy best practices, and more. The book is intended to help candidates prepare for security certification exams such as CISA, CSTE, and CSQA.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
497 views4 pages

InformationSystemsSecurityByNinaGodbole Good Read

This document provides information about a new book release from Wiley India titled "Information Systems Security: Security Management, Metrics, Frameworks and Best Practices" by Nina Godbole. The book contains 1020 pages and a companion CD. It covers topics such as information security management, risk analysis, network security, cryptography, privacy best practices, and more. The book is intended to help candidates prepare for security certification exams such as CISA, CSTE, and CSQA.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 4

New release from Wiley India

INFORMATION SYSTEMS SECURITY


Security
Management,
Metrics, Frameworks
and Best Practices

Nina Godbole

Price: Rs. 549/-


Pages: 1020

ISBN 13: 978-81-


265-1692-6

Companion CD
contains:

• 37 appendices with
checklists,
guidelines and more,
on the
topics covered.
• 17 case illustrations
to help
readers
appreciate/reinforce
the understanding of
the
concepts.
• Workshop Mapping
document
with ideas for
mapping
contents of chapters
to a
workshops/seminars on
security and privacy.
KEY ATTRIBUTES

v
Written by an experienced industry professional working in the domain, a
professional with extensive experience in teaching at various levels (student
seminars, industry workshops) as well as research.
v
A comprehensive treatment and truly a treatise on the subject of Information
Security
v
Covers SOX and SAS 70 aspects for Asset Management in the context of
Information Systems Security.
v
Detailed explanation of topics "Privacy" and "Biometric Controls".
v
IT Risk Analysis covered.
v
Review questions and reference material pointers after each chapter.
v
Well-illustrated diagrams to help understand the key concepts.
v
Useful for candidates appearing for the CISA certification exam.
v
Maps well with the CBOK for CSTE and CSQA Certifications.

For further information please contact


Email: [email protected]
Table of Contents
Chapter 1: Information Systems in Global Context
Chapter 2: Threats to Information Systems
Chapter 3: Security Considerations in Mobile and Wireless
Computing
Chapter 4: Information Security Management in Organizations
Chapter 5: Building Blocks of Information Security
Chapter 6: Information Security Risk Analysis
Chapter 7: Overview of Physical Security for Information
Systems
Chapter 8: Perimeter Security for Physical Protection
Chapter 9: Biometrics Controls for Security
Chapter 10: Biometrics-Based Security: Issues and Challenges
Chapter 11: Network Security in Perspective
Chapter 12: Networking and Digital Communication Fundamentals
Chapter 13: Cryptography and Encryption
Chapter 14: Intrusion Detection for Securing the Networks
Chapter 15: Firewalls for Network Protection
Chapter 16: Virtual Private Networks for Security
Chapter 17: Security of Wireless Networks
Chapter 18: Business Applications Security: An EAI Perspective
Chapter 19: Security of Electronic Mail Systems
Chapter 20: Security of Databases
Chapter 21: Security of Operating Systems
Chapter 22: Security Models, Frameworks, Standards and
Methodologies
Chapter 23: ISO 17799/ISO 27001
Chapter 24: Systems Security Engineering Capability Maturity
Model – The SSE-CMM
Chapter 25: COBIT, COSO-ERM and SAS 70
Chapter 26: Information Security: Other Models and
Methodologies
Chapter 27: Laws and Legal Framework for Information Security
Chapter 28: Security Metrics
Chapter 29: Privacy – Fundamental Concepts and Principles
Chapter 30: Privacy – Business Challenges
Chapter 31: Privacy – Technological Impacts
Chapter 32: Web Services and Privacy
Chapter 33: Staffing the Security Function
Chapter 34: Business Continuity and Disaster Recovery Planning
Chapter 35: Auditing for Security
Chapter 36: Privacy Best Practices in Organizations
Chapter 37: Asset Management
Chapter 38: Ethical Issues and Intellectual Property Concerns
for InfoSec Professionals

Wiley India Pvt. Ltd.,


HEAD OFFICE: 4435-36/7, Ansari Road, Daryaganj, New Delhi-110002. Tel: 91-11-
43630000 Fax: 91-11-23275895. Email: [email protected]
BANGALORE: Tel: 080-23132383, 9341262124. Telefax: 080-23124319.
Email: [email protected]
MUMBAI: Tel: 022-27889263, 27889272. Telefax: 022-27889263.
Email: [email protected]
www.wileyindia.com

You might also like