SlideShare a Scribd company logo
2
Most read
A new release from Wiley India  Visit: www.wileyindia.com
Visit: www.wileyindia.com Written by an experienced industry professional working in the domain, a professional with extensive  experience in teaching at various levels (student seminars, industry workshops) as well as research. Covers  SOX and SAS 70 aspects for Asset Management in the context of Information Systems Security. A  comprehensive treatment  and truly a treatise  on the subject of Information Security
Visit: www.wileyindia.com Useful  text for  CSQA, CISA and CISM aspirants.  Detailed  explanation of topics " Privacy"  and  "Biometric Controls". Review  questions  and  reference material pointers  after each chapter. Ample  figures  to illustrate key points – over 250 figures! IT Risk Analysis  covered
Visit: www.wileyindia.com
Nina Godbole  has vast experience in the IT industry – System Analysis & Design and Development, as well as Application Support Services, MIS, IT Perspective Planning Training, Security Audits, Quality Management, Operations Management. Nina has also led BPR initiatives and has played an instrumental role in successfully driven organizational initiatives - the ISO 9001, P CMM and CMM-I. She is an active member of many professional bodies and academic research groups. Nina holds a Masters Degree from IIT and MS Engineering (Computer Science) degree from Newport University, USA. She is a CQA, CSTE, CISA, PMP and ITIL Foundation Certified professional. Visit: www.wileyindia.com
Chapter 1:  Information Systems in Global Context Chapter 2:  Threats to Information Systems Chapter 3:  Security Considerations in Mobile and Wireless    Computing Chapter 4:  Information Security Management in Organizations Chapter 5:  Building Blocks of Information Security Chapter 6:  Information Security Risk Analysis Chapter 7:  Overview of Physical Security for Information Systems Chapter 8:  Perimeter Security for Physical Protection Chapter 9:  Biometrics Controls for Security Chapter 10:  Biometrics-based Security: Issues and Challenges Chapter 11:  Network Security in Perspective Chapter 12:  Networking and Digital Communication Fundamentals Chapter 13:  Cryptography and Encryption Chapter 14:  Intrusion Detection for Securing the Networks Visit: www.wileyindia.com
Chapter 15:  Firewalls for Network Protection Chapter 16:  Virtual Private Networks for Security Chapter 17:  Security of Wireless Networks Chapter 18:  Business Applications Security: An EAI Perspective Chapter 19:  Security of Electronic Mail Systems Chapter 20:  Security of Databases Chapter 21:  Security of Operating Systems Chapter 22:  Security Models, Frameworks, Standards and Methodologies Chapter 23:  ISO 17799/ISO 27001 Chapter 24:  Systems Security Engineering Capability Maturity Model –  The SSE-CMM Chapter 25:  COBIT, COSO-ERM and SAS 70 Chapter 26:  Information Security: Other Models and Methodologies Chapter 27:  Laws and Legal Framework for Information Security Chapter  28:  Security Metrics Visit: www.wileyindia.com
Chapter 29:  Privacy - Fundamental Concepts and Principles Chapter 30:  Privacy - Business Challenges Chapter 31:  Privacy - Technological Impacts Chapter 32:  Web Services and Privacy Chapter 33:  Staffing the Security Function Chapter 34:  Business Continuity and Disaster Recovery Planning Chapter 35:  Auditing for Security Chapter 36:  Privacy Best Practices in Organizations Chapter 37:  Asset Management Chapter 38:  Ethical Issues and Intellectual Property Concerns for InfoSec Professionals Visit: www.wileyindia.com
Visit: www.wileyindia.com   37 appendices with checklists, guidelines and  more, on the topics covered. 17 case illustrations to help readers  appreciate/reinforce the understanding of the  concepts. Workshop Mapping document with ideas for  mapping contents of chapters to  workshops/seminars on security and privacy.
ISBN: 978-81-265-1692-6 Information Systems Security: Security Management, Metrics, Frameworks and Best Practices Price: Rs 549/- Pages: 1020 Visit: www.wileyindia.com

More Related Content

What's hot (15)

DOCX
6th International Conference on Cryptography and Information Security (CRIS 2...
IJNSA Journal
 
DOCX
Ijisa
ijfcst journal
 
DOCX
Ijisa
ijfcst journal
 
DOCX
Ijisa
ijfcst journal
 
PPTX
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Mind the Byte
 
PPTX
Seclore For Microsoft 365 | Seclore
Seclore
 
PDF
Secure the modern Enterprise
Microsoft Österreich
 
DOCX
Call for Papers - 6th International Conference on Cryptography and Informatio...
IJNSA Journal
 
PDF
6th International Conference on Cryptography and Information Security (CRIS 2...
IJNSA Journal
 
DOCX
Ijisa
ijfcst journal
 
PDF
6th International Conference on Cryptography and Information Security (CRIS 2...
IJNSA Journal
 
PDF
Untuk penggiat Cyber Security dan Sertifikasi dari isaca csx-update-18_apr - ...
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F
 
PPTX
Sncs2015 cybersecurityy risk and control jakarta 3-4 juni 2015 ver01
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F
 
PPTX
Deep secure holistic protection for ICS
johnsdeepsecure
 
PPTX
Iso iec 27032 foundation - cybersecurity training course
Mart Rovers
 
6th International Conference on Cryptography and Information Security (CRIS 2...
IJNSA Journal
 
Progress towards security in the Cloud-Héctor Sánchez, Microsoft
Mind the Byte
 
Seclore For Microsoft 365 | Seclore
Seclore
 
Secure the modern Enterprise
Microsoft Österreich
 
Call for Papers - 6th International Conference on Cryptography and Informatio...
IJNSA Journal
 
6th International Conference on Cryptography and Information Security (CRIS 2...
IJNSA Journal
 
6th International Conference on Cryptography and Information Security (CRIS 2...
IJNSA Journal
 
Untuk penggiat Cyber Security dan Sertifikasi dari isaca csx-update-18_apr - ...
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F
 
Sncs2015 cybersecurityy risk and control jakarta 3-4 juni 2015 ver01
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F
 
Deep secure holistic protection for ICS
johnsdeepsecure
 
Iso iec 27032 foundation - cybersecurity training course
Mart Rovers
 

Similar to Information Systems Security: Security Management, Metrics, Frameworks and Best Practices (20)

PDF
Using The Isaiec 62443 Standard To Secure Your Control Systems Course Ic32e O...
xemtpmkcmb046
 
PDF
13th International Conference of Security, Privacy and Trust Management (SPTM...
ClaraZara1
 
PDF
13th International Conference of Security, Privacy and Trust Management (SPTM...
ijccsa
 
PDF
13th International Conference of Security, Privacy and Trust Management (SPTM...
ClaraZara1
 
PDF
13th International Conference of Security, Privacy and Trust Management (SPTM...
ClaraZara1
 
PDF
13th International Conference of Security, Privacy and Trust Management (SPTM...
ijcisjournal
 
PDF
CyCron 2016
Cruxcreative
 
PDF
17th International Conference on Network and Communications Security (NCS 2025)
ClaraZara1
 
PPT
S nandakumar
IPPAI
 
PPT
S nandakumar_banglore
IPPAI
 
PDF
Cloud Security Demystified
Michael Torres
 
PPTX
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Amrit Chhetri
 
PDF
digital strategy and information security
Prof. Jacques Folon (Ph.D)
 
PPTX
Managing Cloud Security Risks in Your Organization
Charles Lim
 
PDF
13th International Conference of Security, Privacy and Trust Management (SPTM...
ClaraZara1
 
PDF
World of Watson 2016 - Information Insecurity
Keith Redman
 
PPT
Information security management system Trg 2.ppt
SmppMondha
 
PDF
(eBook PDF) Information Security: Principles and Practices 2nd Edition
rrnohojhxx852
 
PPTX
The Future of Cybersecurity - October 2015
Security Innovation
 
PDF
The Federal Information Security Management Act
Michelle Singh
 
Using The Isaiec 62443 Standard To Secure Your Control Systems Course Ic32e O...
xemtpmkcmb046
 
13th International Conference of Security, Privacy and Trust Management (SPTM...
ClaraZara1
 
13th International Conference of Security, Privacy and Trust Management (SPTM...
ijccsa
 
13th International Conference of Security, Privacy and Trust Management (SPTM...
ClaraZara1
 
13th International Conference of Security, Privacy and Trust Management (SPTM...
ClaraZara1
 
13th International Conference of Security, Privacy and Trust Management (SPTM...
ijcisjournal
 
CyCron 2016
Cruxcreative
 
17th International Conference on Network and Communications Security (NCS 2025)
ClaraZara1
 
S nandakumar
IPPAI
 
S nandakumar_banglore
IPPAI
 
Cloud Security Demystified
Michael Torres
 
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Amrit Chhetri
 
digital strategy and information security
Prof. Jacques Folon (Ph.D)
 
Managing Cloud Security Risks in Your Organization
Charles Lim
 
13th International Conference of Security, Privacy and Trust Management (SPTM...
ClaraZara1
 
World of Watson 2016 - Information Insecurity
Keith Redman
 
Information security management system Trg 2.ppt
SmppMondha
 
(eBook PDF) Information Security: Principles and Practices 2nd Edition
rrnohojhxx852
 
The Future of Cybersecurity - October 2015
Security Innovation
 
The Federal Information Security Management Act
Michelle Singh
 
Ad

Recently uploaded (20)

PPTX
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
PPTX
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
PPTX
MENINGITIS: NURSING MANAGEMENT, BACTERIAL MENINGITIS, VIRAL MENINGITIS.pptx
PRADEEP ABOTHU
 
PPTX
THE TAME BIRD AND THE FREE BIRD.pptxxxxx
MarcChristianNicolas
 
PPTX
2025 Winter SWAYAM NPTEL & A Student.pptx
Utsav Yagnik
 
PPTX
Pyhton with Mysql to perform CRUD operations.pptx
Ramakrishna Reddy Bijjam
 
PPTX
Growth and development and milestones, factors
BHUVANESHWARI BADIGER
 
PPTX
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
PPTX
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
PDF
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
PPTX
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
PDF
The Different Types of Non-Experimental Research
Thelma Villaflores
 
PPTX
How to Set Maximum Difference Odoo 18 POS
Celine George
 
PPTX
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
PDF
community health nursing question paper 2.pdf
Prince kumar
 
PPTX
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
PDF
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
PDF
SSHS-2025-PKLP_Quarter-1-Dr.-Kerby-Alvarez.pdf
AishahSangcopan1
 
PDF
CEREBRAL PALSY: NURSING MANAGEMENT .pdf
PRADEEP ABOTHU
 
PDF
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
HYDROCEPHALUS: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
MENINGITIS: NURSING MANAGEMENT, BACTERIAL MENINGITIS, VIRAL MENINGITIS.pptx
PRADEEP ABOTHU
 
THE TAME BIRD AND THE FREE BIRD.pptxxxxx
MarcChristianNicolas
 
2025 Winter SWAYAM NPTEL & A Student.pptx
Utsav Yagnik
 
Pyhton with Mysql to perform CRUD operations.pptx
Ramakrishna Reddy Bijjam
 
Growth and development and milestones, factors
BHUVANESHWARI BADIGER
 
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
Isharyanti-2025-Cross Language Communication in Indonesian Language
Neny Isharyanti
 
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
The Different Types of Non-Experimental Research
Thelma Villaflores
 
How to Set Maximum Difference Odoo 18 POS
Celine George
 
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
community health nursing question paper 2.pdf
Prince kumar
 
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
SSHS-2025-PKLP_Quarter-1-Dr.-Kerby-Alvarez.pdf
AishahSangcopan1
 
CEREBRAL PALSY: NURSING MANAGEMENT .pdf
PRADEEP ABOTHU
 
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
Ad

Information Systems Security: Security Management, Metrics, Frameworks and Best Practices

  • 1. A new release from Wiley India Visit: www.wileyindia.com
  • 2. Visit: www.wileyindia.com Written by an experienced industry professional working in the domain, a professional with extensive experience in teaching at various levels (student seminars, industry workshops) as well as research. Covers SOX and SAS 70 aspects for Asset Management in the context of Information Systems Security. A comprehensive treatment and truly a treatise on the subject of Information Security
  • 3. Visit: www.wileyindia.com Useful text for CSQA, CISA and CISM aspirants. Detailed explanation of topics " Privacy" and "Biometric Controls". Review questions and reference material pointers after each chapter. Ample figures to illustrate key points – over 250 figures! IT Risk Analysis covered
  • 5. Nina Godbole has vast experience in the IT industry – System Analysis & Design and Development, as well as Application Support Services, MIS, IT Perspective Planning Training, Security Audits, Quality Management, Operations Management. Nina has also led BPR initiatives and has played an instrumental role in successfully driven organizational initiatives - the ISO 9001, P CMM and CMM-I. She is an active member of many professional bodies and academic research groups. Nina holds a Masters Degree from IIT and MS Engineering (Computer Science) degree from Newport University, USA. She is a CQA, CSTE, CISA, PMP and ITIL Foundation Certified professional. Visit: www.wileyindia.com
  • 6. Chapter 1: Information Systems in Global Context Chapter 2: Threats to Information Systems Chapter 3: Security Considerations in Mobile and Wireless Computing Chapter 4: Information Security Management in Organizations Chapter 5: Building Blocks of Information Security Chapter 6: Information Security Risk Analysis Chapter 7: Overview of Physical Security for Information Systems Chapter 8: Perimeter Security for Physical Protection Chapter 9: Biometrics Controls for Security Chapter 10: Biometrics-based Security: Issues and Challenges Chapter 11: Network Security in Perspective Chapter 12: Networking and Digital Communication Fundamentals Chapter 13: Cryptography and Encryption Chapter 14: Intrusion Detection for Securing the Networks Visit: www.wileyindia.com
  • 7. Chapter 15: Firewalls for Network Protection Chapter 16: Virtual Private Networks for Security Chapter 17: Security of Wireless Networks Chapter 18: Business Applications Security: An EAI Perspective Chapter 19: Security of Electronic Mail Systems Chapter 20: Security of Databases Chapter 21: Security of Operating Systems Chapter 22: Security Models, Frameworks, Standards and Methodologies Chapter 23: ISO 17799/ISO 27001 Chapter 24: Systems Security Engineering Capability Maturity Model – The SSE-CMM Chapter 25: COBIT, COSO-ERM and SAS 70 Chapter 26: Information Security: Other Models and Methodologies Chapter 27: Laws and Legal Framework for Information Security Chapter 28: Security Metrics Visit: www.wileyindia.com
  • 8. Chapter 29: Privacy - Fundamental Concepts and Principles Chapter 30: Privacy - Business Challenges Chapter 31: Privacy - Technological Impacts Chapter 32: Web Services and Privacy Chapter 33: Staffing the Security Function Chapter 34: Business Continuity and Disaster Recovery Planning Chapter 35: Auditing for Security Chapter 36: Privacy Best Practices in Organizations Chapter 37: Asset Management Chapter 38: Ethical Issues and Intellectual Property Concerns for InfoSec Professionals Visit: www.wileyindia.com
  • 9. Visit: www.wileyindia.com 37 appendices with checklists, guidelines and more, on the topics covered. 17 case illustrations to help readers appreciate/reinforce the understanding of the concepts. Workshop Mapping document with ideas for mapping contents of chapters to workshops/seminars on security and privacy.
  • 10. ISBN: 978-81-265-1692-6 Information Systems Security: Security Management, Metrics, Frameworks and Best Practices Price: Rs 549/- Pages: 1020 Visit: www.wileyindia.com