A Comprehensive Book on InformationSystemsSecurityByNinaGodbole

June 9, 2016 | Author: Nina S. Godbole | Category: Types, Books - Non-fiction
Share Embed Donate


Short Description

This will help readers reach and procure one of the most comprehensive book on the topic of Information Systems Security...

Description

New release from Wiley India

INFORMATION SYSTEMS SECURITY Security Management, Metrics, Frameworks and Best Practices

Nina Godbole

Price: Rs. 549/Pages: 1020 ISBN 13: 978-81-265-1692-6 Companion CD contains:

KEY ATTRIBUTES

• 37 appendices with checklists, guidelines and more, on the topics covered. • 17 case illustrations to help readers appreciate/reinforce the understanding of the concepts. • Workshop Mapping document with ideas for mapping contents of chapters to a workshops/seminars on security and privacy.

Written by an experienced industry professional working in the domain, a v professional with extensive experience in teaching at various levels (student seminars, industry workshops) as well as research. A comprehensive treatment and truly a treatise on the subject of Information Security v Covers SOX and SAS 70 aspects for Asset Management in the context of v Information Systems Security. Detailed explanation of topics "Privacy" and "Biometric Controls". v IT Risk Analysis covered. v Review questions and reference material pointers after each chapter. v Well-illustrated diagrams to help understand the key concepts. v Useful for candidates appearing for the CISA certification exam. v Maps well with the CBOK for CSTE and CSQA Certifications. v

For further information please contact

Email: [email protected]

Table of Contents Chapter 1: Information Systems in Global Context Chapter 2: Threats to Information Systems Chapter 3: Security Considerations in Mobile and Wireless Computing Chapter 4: Information Security Management in Organizations Chapter 5: Building Blocks of Information Security Chapter 6: Information Security Risk Analysis Chapter 7: Overview of Physical Security for Information Systems Chapter 8: Perimeter Security for Physical Protection Chapter 9: Biometrics Controls for Security Chapter 10: Biometrics-Based Security: Issues and Challenges Chapter 11: Network Security in Perspective Chapter 12: Networking and Digital Communication Fundamentals Chapter 13: Cryptography and Encryption Chapter 14: Intrusion Detection for Securing the Networks Chapter 15: Firewalls for Network Protection Chapter 16: Virtual Private Networks for Security Chapter 17: Security of Wireless Networks Chapter 18: Business Applications Security: An EAI Perspective Chapter 19: Security of Electronic Mail Systems Chapter 20: Security of Databases Chapter 21: Security of Operating Systems Chapter 22: Security Models, Frameworks, Standards and Methodologies Chapter 23: ISO 17799/ISO 27001 Chapter 24: Systems Security Engineering Capability Maturity Model – The SSE-CMM Chapter 25: COBIT, COSO-ERM and SAS 70 Chapter 26: Information Security: Other Models and Methodologies Chapter 27: Laws and Legal Framework for Information Security Chapter 28: Security Metrics Chapter 29: Privacy – Fundamental Concepts and Principles Chapter 30: Privacy – Business Challenges Chapter 31: Privacy – Technological Impacts Chapter 32: Web Services and Privacy Chapter 33: Staffing the Security Function Chapter 34: Business Continuity and Disaster Recovery Planning Chapter 35: Auditing for Security Chapter 36: Privacy Best Practices in Organizations Chapter 37: Asset Management Chapter 38: Ethical Issues and Intellectual Property Concerns for InfoSec Professionals

Wiley India Pvt. Ltd., HEAD OFFICE: 4435-36/7, Ansari Road, Daryaganj, New Delhi-110002. Tel: 91-11-43630000 Fax: 91-11-23275895. Email: [email protected] BANGALORE: Tel: 080-23132383, 9341262124. Telefax: 080-23124319. Email: [email protected] MUMBAI: Tel: 022-27889263, 27889272. Telefax: 022-27889263. Email: [email protected] www.wileyindia.com

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF