New release from Wiley India
INFORMATION SYSTEMS SECURITY Security Management, Metrics, Frameworks and Best Practices
Nina Godbole
Price: Rs. 549/Pages: 1020 ISBN 13: 978-81-265-1692-6 Companion CD contains:
KEY ATTRIBUTES
• 37 appendices with checklists, guidelines and more, on the topics covered. • 17 case illustrations to help readers appreciate/reinforce the understanding of the concepts. • Workshop Mapping document with ideas for mapping contents of chapters to a workshops/seminars on security and privacy.
Written by an experienced industry professional working in the domain, a v professional with extensive experience in teaching at various levels (student seminars, industry workshops) as well as research. A comprehensive treatment and truly a treatise on the subject of Information Security v Covers SOX and SAS 70 aspects for Asset Management in the context of v Information Systems Security. Detailed explanation of topics "Privacy" and "Biometric Controls". v IT Risk Analysis covered. v Review questions and reference material pointers after each chapter. v Well-illustrated diagrams to help understand the key concepts. v Useful for candidates appearing for the CISA certification exam. v Maps well with the CBOK for CSTE and CSQA Certifications. v
For further information please contact
Email:
[email protected]
Table of Contents Chapter 1: Information Systems in Global Context Chapter 2: Threats to Information Systems Chapter 3: Security Considerations in Mobile and Wireless Computing Chapter 4: Information Security Management in Organizations Chapter 5: Building Blocks of Information Security Chapter 6: Information Security Risk Analysis Chapter 7: Overview of Physical Security for Information Systems Chapter 8: Perimeter Security for Physical Protection Chapter 9: Biometrics Controls for Security Chapter 10: Biometrics-Based Security: Issues and Challenges Chapter 11: Network Security in Perspective Chapter 12: Networking and Digital Communication Fundamentals Chapter 13: Cryptography and Encryption Chapter 14: Intrusion Detection for Securing the Networks Chapter 15: Firewalls for Network Protection Chapter 16: Virtual Private Networks for Security Chapter 17: Security of Wireless Networks Chapter 18: Business Applications Security: An EAI Perspective Chapter 19: Security of Electronic Mail Systems Chapter 20: Security of Databases Chapter 21: Security of Operating Systems Chapter 22: Security Models, Frameworks, Standards and Methodologies Chapter 23: ISO 17799/ISO 27001 Chapter 24: Systems Security Engineering Capability Maturity Model – The SSE-CMM Chapter 25: COBIT, COSO-ERM and SAS 70 Chapter 26: Information Security: Other Models and Methodologies Chapter 27: Laws and Legal Framework for Information Security Chapter 28: Security Metrics Chapter 29: Privacy – Fundamental Concepts and Principles Chapter 30: Privacy – Business Challenges Chapter 31: Privacy – Technological Impacts Chapter 32: Web Services and Privacy Chapter 33: Staffing the Security Function Chapter 34: Business Continuity and Disaster Recovery Planning Chapter 35: Auditing for Security Chapter 36: Privacy Best Practices in Organizations Chapter 37: Asset Management Chapter 38: Ethical Issues and Intellectual Property Concerns for InfoSec Professionals
Wiley India Pvt. Ltd., HEAD OFFICE: 4435-36/7, Ansari Road, Daryaganj, New Delhi-110002. Tel: 91-11-43630000 Fax: 91-11-23275895. Email:
[email protected] BANGALORE: Tel: 080-23132383, 9341262124. Telefax: 080-23124319. Email:
[email protected] MUMBAI: Tel: 022-27889263, 27889272. Telefax: 022-27889263. Email:
[email protected] www.wileyindia.com