• List Price: $138.95
  • Save: $103.07(74%)
Rented from RentU
To Rent, select Shipping State from options above
Due Date: May 31, 2015
FREE return shipping at the end of the semester. Access codes and supplements are not guaranteed with rentals.
  • List Price: $138.95
  • Save: $22.38 (16%)
Only 17 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Sell yours for a Gift Card
We'll buy it for $81.63
Learn More
Trade in now
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Management of Information Security Paperback – October 7, 2013

ISBN-13: 978-1285062297 ISBN-10: 1285062299 Edition: 4th

Buy New
Price: $116.57
Price: $35.87 - $35.88
20 New from $111.91 25 Used from $106.47
Rent from Amazon Price New from Used from
"Please retry"
"Please retry"
$111.91 $106.47

Frequently Bought Together

Management of Information Security + Hands-On Ethical Hacking and Network Defense + Guide to Computer Forensics and Investigations (Book & CD)
Price for all three: $361.22

Buy the selected items together
If you buy a new print edition of this book (or purchased one in the past), you can buy the Kindle edition for only $9.99 (Save 91%). Print edition purchase must be sold by Amazon. Learn more.

Shop the New Digital Design Bookstore
Check out the Digital Design Bookstore, a new hub for photographers, art directors, illustrators, web developers, and other creative individuals to find highly rated and highly relevant career resources. Shop books on web development and graphic design, or check out blog posts by authors and thought-leaders in the design industry. Shop now

Product Details

  • Paperback: 592 pages
  • Publisher: Cengage Learning; 4 edition (October 7, 2013)
  • Language: English
  • ISBN-10: 1285062299
  • ISBN-13: 978-1285062297
  • Product Dimensions: 9 x 7.3 x 1.2 inches
  • Shipping Weight: 2.2 pounds (View shipping rates and policies)
  • Average Customer Review: 3.2 out of 5 stars  See all reviews (6 customer reviews)
  • Amazon Best Sellers Rank: #72,766 in Books (See Top 100 in Books)

Editorial Reviews


1. Introduction to Management of Information Security. 2. Planning for Security. 3. Planning for Contingencies. 4. Information Security Policy. 5. Developing the Security Program. 6. Security Management Models. 7. Security Management Practices. 8. Risk Management: Identifying and Assessing Risk. 9. Risk Management: Controlling Risk. 10. Protection Mechanisms. 11. Personnel and Security. 12. Law and Ethics. Appendix A. NIST SP 800-26, Security Self-Assessment Guide for Information. Technology Systems and ISO 27002 Questionnaire. Appendix B. Risk Management Models.

About the Author

Michael Whitman, Ph.D., CISM, CISSP, is a professor of information systems and security in the CSIS department at Kennesaw State University, where he also serves as director of the KSU Center for Information Security Education and coordinator for the Bachelor of Science in Information Security and Assurance program. Dr. Whitman is an active researcher in information security, fair and responsible use policies, ethical computing, and information systems research methods. He currently teaches graduate and undergraduate courses in information security and data communications and is an active member of the Computer Security Institute, the Information Systems Security Association, the Georgia Electronic Commerce Association's Information Security Working Group, the Association for Computing Machinery, and the Association for Information Systems. Dr. Whitman has published articles in the industry's top journals and co-authored a number of books in the field published by Course Technology.

Herbert Mattord, M.B.A., CISM, CISSP, gained 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining the faculty at Kennesaw State University in 2002. During his career as an IT practitioner, Mattord served as manager of corporate information technology security at Georgia-Pacific Corporation, where he acquired much of the practical knowledge presented in this textbook. He currently teaches undergraduate courses in information security, data communications, local area networks, database technology, project management, and systems analysis and design. Mattord also serves as coordinator for the Bachelor of Business Administration and Certificate in Information Security and Assurance programs, as well as operations manager of the KSU Center for Information Security Education and Awareness. Mattord is the co-author of several books published by Course Technology and is an active researcher in information security management topics.

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

3.2 out of 5 stars
Share your thoughts with other customers

Most Helpful Customer Reviews

3 of 3 people found the following review helpful By Paul S. Heath on June 3, 2014
Format: Paperback Verified Purchase
My teacher assigned this book for our class and it is one of the hardest and driest books to read. I feel like every chapter is the same and I am reading a slightly different versions of chapter one. To top it off I have to take a quiz on the information. Even the powerpoints that accompany the book are 55 slides or more.
I think this book suffers mainly from lazy writing and lazy editing. If this book had been properly edited it would have been a third of the size that it is and the student would walk away with the meat of the subject instead of a little meat and a whole lot of fat.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Kindle Edition Verified Purchase
I was Reading/searching contents from kindle app that is very very slow. not worth it unless amazon provides PDF file.

I have spent $75 and now I am crying.

I am asking amazon for providing any other solution or provide PDF file itself.
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback Verified Purchase
This textbook was written well, it helped me to understand the nature of information security, and how to properly management. It is recommended that is textbook come with an interactive course to help include updated security threats to IT networks.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

What Other Items Do Customers Buy After Viewing This Item?