Shop securely with PayTo on Amazon. Direct payments from your trusted bank. No card details required.
$36.56
Only 3 left in stock.
US imports may differ from local products. Additional terms apply. Learn More.

Amazon Global Store

  • International products have separate terms and are sold from abroad and may differ from local products including fit, age rating, and language of product, labeling, or instructions, or plugs (you may require an adapter).
  • Manufacturer warranty may not apply but you may have other rights under law.
  • Learn more about Amazon Global Store
$$36.56 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$36.56
Subtotal
Initial payment breakdown
Delivery cost, delivery date and order total (including tax) shown at checkout.
Ships from
Amazon US
Amazon US
Ships from
Amazon US
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet or computer—no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera, scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the authors

See all
Something went wrong. Please try your request again later.

Management of Information Security Paperback – International Edition, 7 October 2013

4.2 out of 5 stars 51 ratings
Edition: 4th

{"desktop_buybox_group_1":[{"displayPrice":"$36.56","priceAmount":36.56,"currencySymbol":"$","integerValue":"36","decimalSeparator":".","fractionalValue":"56","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"%2BPymNnBjj1ifsd4AFoLMZ6SikXPafbcs1rSidQ3SrDp3oyBkzd5ulgLDJ3h8WtvRF%2BMXrMyAZS%2BInt9C6kLYpEWBjsgn%2Fmb1g%2BJxgpjzaD4%2BaP8jWAHXVIXn3AwPElcgnkYsoqWbrpoiR9VXqHRq2JZlxPIzMns3roQ59RLhOEc8Yl%2Bk0EEOWMW13vdzvK7h","locale":"en-AU","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}]}

Purchase options and add-ons

MANAGEMENT OF INFORMATION SECURITY, Fourth Edition gives readers an overview of information security and assurance using both domestic and international standards, all from a management perspective. Beginning with the foundational and technical components of information security, this edition then focuses on access control models, information security governance, and information security program assessment and metrics.The Fourth Edition is revised and updated to reflect changes in the field, including the ISO 27000 series, so as to prepare readers to succeed in the workplace.

There is a newer edition of this item:

Product description

Review

1. Introduction to Management of Information Security. 2. Planning for Security. 3. Planning for Contingencies. 4. Information Security Policy. 5. Developing the Security Program. 6. Security Management Models. 7. Security Management Practices. 8. Risk Management: Identifying and Assessing Risk. 9. Risk Management: Controlling Risk. 10. Protection Mechanisms. 11. Personnel and Security. 12. Law and Ethics. Appendix A. NIST SP 800-26, Security Self-Assessment Guide for Information. Technology Systems and ISO 27002 Questionnaire. Appendix B. Risk Management Models.

About the Author

Herbert Mattord, Ph.D., C.I.S.M., C.I.S.S.P., completed 24 years of IT industry experience as an application developer, database administrator, project manager and information security practitioner before joining the faculty at Kennesaw State University, where he serves as a professor of information security and assurance and cybersecurity. Dr. Mattord currently teaches graduate and undergraduate courses. He is also a senior editor of the Journal of Cybersecurity Education, Research and Practice. He and Dr. Michael Whitman have authored PRINCIPLES OF INFORMATION SECURITY; PRINCIPLES OF INCIDENT RESPONSE AND DISASTER RECOVERY; MANAGEMENT OF INFORMATION SECURITY; READINGS AND CASES IN THE MANAGEMENT OF INFORMATION SECURITY; THE GUIDE TO NETWORK SECURITY and THE HANDS-ON INFORMATION SECURITY LAB MANUAL. Dr. Mattord is an active researcher, author and consultant in information security management and related topics. He has published articles in the Information Resources Management Journal, Journal of Information Security Education, the Journal of Executive Education and the International Journal of Interdisciplinary Telecommunications and Networking. Dr. Mattord is a member of the Information Systems Security Association, ISACA, and the Association for Information Systems. During his career as an IT practitioner, Dr. Mattord was an adjunct professor at Kennesaw State University, Southern Polytechnic State University, Austin Community College and Texas State University: San Marcos. He was formerly the manager of corporate information technology security at Georgia-Pacific Corporation, where he acquired much of the practical knowledge found in this and his other textbooks.

Michael E. Whitman, Ph.D., C.I.S.M., C.I.S.S.P., is the executive director of the Institute for Cybersecurity Workforce Development and a professor of information security at Kennesaw State University. In 2004, 2007, 2012 and 2015, under Dr. Whitman's direction the Center for Information Security Education spearheaded K.S.U.’s successful bid for the prestigious National Center of Academic Excellence recognitions (CAE/IAE and CAE/CDE), awarded jointly by the Department of Homeland Security and the National Security Agency. Dr. Whitman is also the editor-in-chief of the Journal of Cybersecurity Education and Research and Practice and director of the Southeast Collegiate Cyber Defense Competition. Dr. Whitman is an active researcher and author in information security policy, threats, curriculum development and ethical computing. He currently teaches graduate and undergraduate courses in information security. Dr. Whitman has several information security textbooks currently in print, including PRINCIPLES OF INFORMATION SECURITY; PRINCIPLES OF INCIDENT RESPONSE AND DISASTER RECOVERY; MANAGEMENT OF INFORMATION SECURITY; READINGS AND CASES IN THE MANAGEMENT OF INFORMATION SECURITY, VOLUMES I AND II; THE HANDS-ON INFORMATION SECURITY LAB MANUAL; THE GUIDE TO NETWORK SECURITY and THE GUIDE TO FIREWALLS AND NETWORK SECURITY. He has published articles in Information Systems Research, the Communications of the ACM, the Journal of International Business Studies, Information and Management and the Journal of Computer Information Systems. Dr. Whitman is a member of the Information Systems Security Association, ISACA and the Association for Information Systems. Previously, Dr. Whitman served the U.S. Army as an armored cavalry officer with additional duties as the automated data processing system security officer (ADPSSO).

Product details

  • Publisher ‏ : ‎ Course Technology ISE; 4th edition (7 October 2013)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 576 pages
  • ISBN-10 ‏ : ‎ 1285062299
  • ISBN-13 ‏ : ‎ 978-1285062297
  • Dimensions ‏ : ‎ 19.05 x 3.18 x 23.5 cm
  • Customer Reviews:
    4.2 out of 5 stars 51 ratings

About the authors

Follow authors to get new release updates, plus improved recommendations.

Customer reviews

4.2 out of 5 stars
51 global ratings

Review this product

Share your thoughts with other customers

Top reviews from Australia

There are 0 reviews and 0 ratings from Australia

Top reviews from other countries

  • Amazon Customer
    5.0 out of 5 stars Five Stars
    Reviewed in the United Kingdom on 19 October 2015
    Verified Purchase
    good
  • Katie
    5.0 out of 5 stars Great Book!
    Reviewed in the United States on 7 December 2016
    Verified Purchase
    This is a great book. This text was my first introduction to the InfoSec field. It really made the whole concept of InfoSec interesting and understandable. Each chapter has a piece of a story at the beginning allowing the reader to understand how the concept of the chapter can be applied before ever actually reading the chapter. The chapter then explains the concept of the short story and if there was a problem it would then explain how to fix it.
    My class had quizzes each week on the latest chapter so I took a day to read the chapter and answer the questions. I always looked forward to reading the chapter on this day. Though the task could be daunting (40 pgs.), but it was all very interesting!
  • Kev
    5.0 out of 5 stars Helpful and full of relevant information
    Reviewed in the United States on 28 October 2016
    Verified Purchase
    I've reviewed other books in this series and this one is no different. It has great content and doesn't lull the reader into a brain dead reading where they just try to scan for relevant information. I'm majoring in Network Security, and I found the book very relevant and helpful for my classes and personal studies. I'd encourage anyone looking to expand their knowledge on the management side of information security to give the book a read.
  • Ronald Sama
    4.0 out of 5 stars Book in perfect condition and serving its purpose to me
    Reviewed in the United States on 14 February 2015
    Verified Purchase
    Book in perfect condition and serving its purpose to me. Good book to have as part of your collections, great knowledge in it.
  • S. P. Dobbs
    5.0 out of 5 stars Great buy
    Reviewed in the United States on 3 May 2023
    Verified Purchase
    This fit my course perfectly