Cover; Dedication; Contents; Foreword; Foreword; Preface; Acknowledgments; About the Author; Part I; Part I: Introduction; Chapter 1: Introduction; Chapter 2: The Art of Security Assessment; Chapter 3: Security Architecture of Systems; Chapter 4: Information Security Risk; Chapter 5: Prepare for Assessment; Part I: Summary; Part II; Part II: Introduction; Chapter 6: eCommerce Website; Chapter 7: Enterprise Architecture; Chapter 8: Business Analytics; Chapter 9: Endpoint Anti-malware; Chapter 10: Mobile Security Software with Cloud Management; Chapter 11: Cloud Software as a Service (SaaS).
Part II: SummaryPart III; Part III: Introduction; Chapter 12: Patterns and Governance Deliver Economies of Scale; Chapter 13: Building an Assessment Program; Part III: Summary and Afterword; Back Cover.