A new release from Wiley India  Visit: www.wileyindia.com
Visit: www.wileyindia.com Written by an experienced industry professional working in the domain, a professional with exten...
Visit: www.wileyindia.com Useful  text for  CSQA, CISA and CISM aspirants.  Detailed  explanation of topics " Privacy...
Visit: www.wileyindia.com
<ul><li>Nina Godbole  has vast experience in the IT industry – System </li></ul><ul><li>Analysis & Design and Development,...
<ul><li>Chapter 1:  Information Systems in Global Context </li></ul><ul><li>Chapter 2:  Threats to Information Systems </l...
<ul><li>Chapter 15:  Firewalls for Network Protection </li></ul><ul><li>Chapter 16:  Virtual Private Networks for Security...
<ul><li>Chapter 29:  Privacy - Fundamental Concepts and Principles </li></ul><ul><li>Chapter 30:  Privacy - Business Chall...
Visit: www.wileyindia.com   37 appendices with checklists, guidelines and  more, on the topics covered. 17 case illustrati...
<ul><li>ISBN: 978-81-265-1692-6 </li></ul><ul><li>Information Systems Security: Security Management, Metrics, Frameworks a...
Upcoming SlideShare
Loading in...5
×

Information Systems Security: Security Management, Metrics, Frameworks and Best Practices

5,896

Published on

Information and communication systems can be exposed to intrusion and risks, within the overall architecture and design of these systems. These areas of risks can span the entire gamut of information systems including databases, networks, applications, internet-based communication, web services, mobile technologies and people issues associated with all of them. It is vital for businesses to be fully aware of security risks associated with their systems as well as the regulatory body pressures; and develop and implement an effective strategy to handle those risks.
This book covers all of the aforementioned issues in depth. It covers all significant aspects of security, as it deals with ICT, and provides practicing ICT security professionals explanations to various aspects of information systems, their corresponding security risks and how to embark on strategic approaches to reduce and, preferably, eliminate those risks. Written by an experienced industry professional working in the domain, with extensive experience in teaching at various levels as well as research, this book is truly a treatise on the subject of Information Security.

Published in: Education
1 Comment
2 Likes
Statistics
Notes
  • all the information in this book is in easy language
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
5,896
On Slideshare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
444
Comments
1
Likes
2
Embeds 0
No embeds

No notes for slide

Information Systems Security: Security Management, Metrics, Frameworks and Best Practices

  1. 1. A new release from Wiley India Visit: www.wileyindia.com
  2. 2. Visit: www.wileyindia.com Written by an experienced industry professional working in the domain, a professional with extensive experience in teaching at various levels (student seminars, industry workshops) as well as research. Covers SOX and SAS 70 aspects for Asset Management in the context of Information Systems Security. A comprehensive treatment and truly a treatise on the subject of Information Security
  3. 3. Visit: www.wileyindia.com Useful text for CSQA, CISA and CISM aspirants. Detailed explanation of topics &quot; Privacy&quot; and &quot;Biometric Controls&quot;. Review questions and reference material pointers after each chapter. Ample figures to illustrate key points – over 250 figures! <ul><ul><li>IT Risk Analysis covered </li></ul></ul>
  4. 4. Visit: www.wileyindia.com
  5. 5. <ul><li>Nina Godbole has vast experience in the IT industry – System </li></ul><ul><li>Analysis & Design and Development, as well as Application </li></ul><ul><li>Support Services, MIS, IT Perspective Planning Training, Security </li></ul><ul><li>Audits, Quality Management, Operations Management. Nina has </li></ul><ul><li>also led BPR initiatives and has played an instrumental role in </li></ul><ul><li>successfully driven organizational initiatives - the ISO 9001, P </li></ul><ul><li>CMM and CMM-I. She is an active member of many professional </li></ul><ul><li>bodies and academic research groups. </li></ul><ul><li>Nina holds a Masters Degree from IIT and MS Engineering (Computer </li></ul><ul><li>Science) degree from Newport University, USA. She is a CQA, CSTE, </li></ul><ul><li>CISA, PMP and ITIL Foundation Certified professional. </li></ul>Visit: www.wileyindia.com
  6. 6. <ul><li>Chapter 1: Information Systems in Global Context </li></ul><ul><li>Chapter 2: Threats to Information Systems </li></ul><ul><li>Chapter 3: Security Considerations in Mobile and Wireless </li></ul><ul><li>Computing </li></ul><ul><li>Chapter 4: Information Security Management in Organizations </li></ul><ul><li>Chapter 5: Building Blocks of Information Security </li></ul><ul><li>Chapter 6: Information Security Risk Analysis </li></ul><ul><li>Chapter 7: Overview of Physical Security for Information Systems </li></ul><ul><li>Chapter 8: Perimeter Security for Physical Protection </li></ul><ul><li>Chapter 9: Biometrics Controls for Security </li></ul><ul><li>Chapter 10: Biometrics-based Security: Issues and Challenges </li></ul><ul><li>Chapter 11: Network Security in Perspective </li></ul><ul><li>Chapter 12: Networking and Digital Communication Fundamentals </li></ul><ul><li>Chapter 13: Cryptography and Encryption </li></ul><ul><li>Chapter 14: Intrusion Detection for Securing the Networks </li></ul>Visit: www.wileyindia.com
  7. 7. <ul><li>Chapter 15: Firewalls for Network Protection </li></ul><ul><li>Chapter 16: Virtual Private Networks for Security </li></ul><ul><li>Chapter 17: Security of Wireless Networks </li></ul><ul><li>Chapter 18: Business Applications Security: An EAI Perspective </li></ul><ul><li>Chapter 19: Security of Electronic Mail Systems </li></ul><ul><li>Chapter 20: Security of Databases </li></ul><ul><li>Chapter 21: Security of Operating Systems </li></ul><ul><li>Chapter 22: Security Models, Frameworks, Standards and </li></ul><ul><li>Methodologies </li></ul><ul><li>Chapter 23: ISO 17799/ISO 27001 </li></ul><ul><li>Chapter 24: Systems Security Engineering Capability Maturity Model </li></ul><ul><li>– The SSE-CMM </li></ul><ul><li>Chapter 25: COBIT, COSO-ERM and SAS 70 </li></ul><ul><li>Chapter 26: Information Security: Other Models and Methodologies </li></ul><ul><li>Chapter 27: Laws and Legal Framework for Information Security </li></ul><ul><li>Chapter 28: Security Metrics </li></ul>Visit: www.wileyindia.com
  8. 8. <ul><li>Chapter 29: Privacy - Fundamental Concepts and Principles </li></ul><ul><li>Chapter 30: Privacy - Business Challenges </li></ul><ul><li>Chapter 31: Privacy - Technological Impacts </li></ul><ul><li>Chapter 32: Web Services and Privacy </li></ul><ul><li>Chapter 33: Staffing the Security Function </li></ul><ul><li>Chapter 34: Business Continuity and Disaster Recovery Planning </li></ul><ul><li>Chapter 35: Auditing for Security </li></ul><ul><li>Chapter 36: Privacy Best Practices in Organizations </li></ul><ul><li>Chapter 37: Asset Management </li></ul><ul><li>Chapter 38: Ethical Issues and Intellectual Property Concerns for </li></ul><ul><li>InfoSec Professionals </li></ul>Visit: www.wileyindia.com
  9. 9. Visit: www.wileyindia.com 37 appendices with checklists, guidelines and more, on the topics covered. 17 case illustrations to help readers appreciate/reinforce the understanding of the concepts. Workshop Mapping document with ideas for mapping contents of chapters to workshops/seminars on security and privacy.
  10. 10. <ul><li>ISBN: 978-81-265-1692-6 </li></ul><ul><li>Information Systems Security: Security Management, Metrics, Frameworks and Best Practices </li></ul><ul><li>Price: Rs 549/- </li></ul><ul><li>Pages: 1020 </li></ul>Visit: www.wileyindia.com
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×