Professional Documents
Culture Documents
A Comprehensive Book On InformationSystemsSecurityByNinaGodbole
A Comprehensive Book On InformationSystemsSecurityByNinaGodbole
Nina Godbole
KEY ATTRIBUTES
Email: acadmktg@wileyindia.com
Table of Contents
Chapter 1: Information Systems in Global Context
Chapter 2: Threats to Information Systems
Chapter 3: Security Considerations in Mobile and Wireless Computing
Chapter 4: Information Security Management in Organizations
Chapter 5: Building Blocks of Information Security
Chapter 6: Information Security Risk Analysis
Chapter 7: Overview of Physical Security for Information Systems
Chapter 8: Perimeter Security for Physical Protection
Chapter 9: Biometrics Controls for Security
Chapter 10: Biometrics-Based Security: Issues and Challenges
Chapter 11: Network Security in Perspective
Chapter 12: Networking and Digital Communication Fundamentals
Chapter 13: Cryptography and Encryption
Chapter 14: Intrusion Detection for Securing the Networks
Chapter 15: Firewalls for Network Protection
Chapter 16: Virtual Private Networks for Security
Chapter 17: Security of Wireless Networks
Chapter 18: Business Applications Security: An EAI Perspective
Chapter 19: Security of Electronic Mail Systems
Chapter 20: Security of Databases
Chapter 21: Security of Operating Systems
Chapter 22: Security Models, Frameworks, Standards and Methodologies
Chapter 23: ISO 17799/ISO 27001
Chapter 24: Systems Security Engineering Capability Maturity Model The SSE-CMM
Chapter 25: COBIT, COSO-ERM and SAS 70
Chapter 26: Information Security: Other Models and Methodologies
Chapter 27: Laws and Legal Framework for Information Security
Chapter 28: Security Metrics
Chapter 29: Privacy Fundamental Concepts and Principles
Chapter 30: Privacy Business Challenges
Chapter 31: Privacy Technological Impacts
Chapter 32: Web Services and Privacy
Chapter 33: Staffing the Security Function
Chapter 34: Business Continuity and Disaster Recovery Planning
Chapter 35: Auditing for Security
Chapter 36: Privacy Best Practices in Organizations
Chapter 37: Asset Management
Chapter 38: Ethical Issues and Intellectual Property Concerns for InfoSec Professionals