Higher Education

Principles of Information Security, 5th Edition

  • Michael E. Whitman Michael J. Coles College of Business, Kennesaw State University
  • Herbert J. Mattord Michael J. Coles College of Business, Kennesaw State University
  • ISBN-10: 1285448367  |  ISBN-13: 9781285448367
  • 656 Pages
  • Previous Editions: 2012, 2009, 2005
  • © 2015 | Published
  • College Bookstore Wholesale Price = $130.50
  • Newer Edition Available
  *Why an online review copy?
  • It's the greener, leaner way to review! An online copy cuts down on paper and on time. Reduce the wait (and the weight) of printed texts. Your online copy arrives instantly, and you can review it anytime from your computer or favorite mobile device.

If you prefer a print copy to review, please contact your representative.



Specifically oriented to the needs of information systems students, PRINCIPLES OF INFORMATION SECURITY, 5e delivers the latest technology and developments from the field. Taking a managerial approach, this market-leading introductory book teaches all the aspects of information security-not just the technical control perspective. It provides a broad review of the entire field of information security, background on many related elements, and enough detail to facilitate understanding of the topic. It covers the terminology of the field, the history of the discipline, and an overview of how to manage an information security program. Current and relevant, the fifth edition includes the latest practices, fresh examples, updated material on technical security controls, emerging legislative issues, new coverage of digital forensics, and hands-on application of ethical issues in IS security. It is the ultimate resource for future business decision-makers.

Features and Benefits

  • PRINCIPLES OF INFORMATION SECURITY, 5e illustrates that information security in the modern organization is a problem for management to solve and not a problem that technology alone can answer-a problem that has important economic consequences and for which management will be held accountable.
  • Each chapter opens with a short story that follows the same fictional company as it encounters the real-world issues of information security. At the end of the chapter, discussion questions complete the case study scenario, giving instructors and students the opportunity to discuss the underlying issues.
  • Interspersed throughout the textbook, Offline and Technical Details boxes highlight interesting topics and some technical issues, enabling students to delve into key concepts more deeply.
  • Chapters end with a Summary, Review Questions and Exercises that give students the opportunity to examine the information security arena outside the classroom. Exercises prompt students to research, analyze and write to reinforce learning objectives and deepen their understanding of the text.
  • Emphasizing real-world application, the text is packed with examples of information security issues, tools and practices implemented in today's organizations.
  • Up-to-date managerial content equips students with general but valuable information without bogging them down with extraneous, highly specific details.
  • The text conforms fully to CNSS Training Standard 4011, which allows federal recognition of programs based on this book.

Table of Contents

1. Introduction to Information Security.
2. The Need for Security.
3. Legal, Ethical, and Professional Issues in Information Security.
4. Planning for Security.
5. Risk Management.
6. Security Technology: Firewalls, VPNs, and Wireless.
7. Security Technology: Intrusion Detection and Prevention Systems and Other Security Tools.
8. Cryptography.
9. Physical Security.
10. Implementing Information Security.
11. Security and Personnel.
12. Information Security Maintenance and eDiscovery.

What's New

  • Completely up to date, PRINCIPLES OF INFORMATION SECURITY, 5e reflects the latest developments from the field, including new innovations in technology and methodologies, updated examples and references, and the most current coverage of emerging issues available.
  • Restructured treatment of threats and attacks improve the logical flow of the text while providing added depth on threat levels and severities as well as expanded coverage of attacks against information systems.
  • Updated material on technical security controls includes enhancements to the coverage of firewall rules and wireless security (WEP, WPA, etc.).
  • Risk management coverage has been refreshed and enhanced to better reflect current industry practice.
  • The coverage of digital forensics and e-discovery has been expanded.
  • New information on software security is the most up to date available.
  • Ch. 3 Legal, Ethical, and Professional Issues in Information Security details the newest laws, legislative efforts and legal interpretations in the United States and abroad as well as a host of identity theft bills.
  • Updated computer forensics content focuses more on the perspective of the general security professional than the forensics specialist.
  • Updated chapter sequences improve the flow and linkage of risk management and planning activities.
  • A new end-of-chapter feature focuses on ethical decision making in the context of each chapter's opening case study, giving students hands-on experience dealing with the ethical issues of real-world practice.

Learning Resource Bundles

Choose the textbook packaged with the resources that best meet your course and student needs. Contact your Learning Consultant for more information.

Bundle: Principles of Information Security, 5th + Lab Manual for Security+ Guide to Network Security Fundamentals, 5th

ISBN-10: 1337088617 | ISBN-13: 9781337088619

List Price = $244.95  | CengageBrain Price = $244.95  | College Bookstore Wholesale Price = $183.71

This Bundle Includes:

  • Principles of Information Security
    List Price = $173.95  | CengageBrain Price = $173.95  | College Bookstore Wholesale Price = $130.50
  • Lab Manual
    List Price = $83.95  | CengageBrain Price = $83.95  | College Bookstore Wholesale Price = $63.00


All supplements have been updated in coordination with the main title. Select the main title's "About" tab, then select "What's New" for updates specific to title's edition.

For more information about these supplements, or to obtain them, contact your Learning Consultant.

Instructor Supplements

Cengage Learning Testing, powered by Cognero Instant Access  (ISBN-10: 1305273257 | ISBN-13: 9781305273252)

Cengage Learning Testing Powered by Cognero is a flexible, online system that allows you to: author, edit, and manage test bank content from multiple Cengage Learning solutions create multiple test versions in an instant deliver tests from your LMS, your classroom or wherever you want.

Meet the Author

Author Bio

Michael E. Whitman

Michael Whitman, Ph.D., CISM, CISSP, is Professor of Information Security at Kennesaw State University, Kennesaw, Georgia. He also serves as the Executive Director of the Center for Information Security Education, Coles College of Business. In 2004, 2007, 2012 and 2015, under his direction the Center for Information Security Education spearheaded KSU’s successful bid for the prestigious National Center of Academic Excellence recognitions (CAE/IAE and CAE IA/CDE), awarded jointly by the Department of Homeland Security and the National Security Agency. Dr. Whitman is also the Editor-in-Chief of the Journal of Cybersecurity Education, Research and Practice, and is Director of the Southeast Collegiate Cyber Defense Competition. Dr. Whitman is an active researcher and author in Information Security Policy, Threats, Curriculum Development, and Ethical Computing. He currently teaches graduate and undergraduate courses in Information Security. Dr. Whitman has several information security textbooks currently in print, including PRINCIPLES OF INFORMATION SECURITY; MANAGEMENT OF INFORMATION SECURITY; READINGS AND CASES IN THE MANAGEMENT OF INFORMATION SECURITY, VOLUMES I AND II; THE HANDS-ON INFORMATION SECURITY LAB MANUAL; PRINCIPLES OF INCIDENT RESPONSE AND DISASTER RECOVERY; and THE GUIDE TO NETWORK SECURITY AND THE GUIDE TO FIREWALLS AND NETWORK SECURITY. He has published articles in Information Systems Research, the Communications of the ACM, the Journal of International Business Studies, Information and Management, and the Journal of Computer Information Systems. Dr. Whitman is a member of the Association for Computing Machinery, the Information Systems Security Association, ISACA and the Association for Information Systems. Previously, Dr. Whitman served the U.S. Army as an Automated Data Processing System Security Officer (ADPSSO).

Herbert J. Mattord

Herbert Mattord, Ph.D., CISM, CISSP, completed 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining the faculty at Kennesaw State University, where he is Assistant Chair of the Department of Information Systems and Associate Professor of Information Security and Assurance program. Dr. Mattord currently teaches graduate and undergraduate courses in Information Security and Assurance as well as Information Systems. He and Michael Whitman have authored PRINCIPLES OF INFORMATION SECURITY, MANAGEMENT OF INFORMATION SECURITY, READINGS AND CASES IN THE MANAGEMENT OF INFORMATION SECURITY, PRINCIPLES OF INCIDENT RESPONSE AND DISASTER RECOVERY, THE GUIDE TO NETWORK SECURITY, and THE HANDS-ON INFORMATION SECURITY LAB MANUAL, Dr. Mattord is an active researcher, author, and consultant in Information Security Management and related topics. He has published articles in the Information Resources Management Journal, Journal of Information Security Education, the Journal of Executive Education, and the International Journal of Interdisciplinary Telecommunications and Networking. Dr. Mattord is a member of the Information Systems Security Association, ISACA, and the Association for Information Systems. During his career as an IT practitioner, Dr. Mattord was an adjunct professor at Kennesaw State University, Southern Polytechnic State University in Marietta, Georgia, Austin Community College in Austin, Texas, and Texas State University: San Marcos. He was formerly the Manager of Corporate Information Technology Security at Georgia-Pacific Corporation, where he acquired much of the practical knowledge found in this and his other textbooks.