---
product_id: 86582801
title: "Roadmap to Information Security: For IT and Infosec Managers Paperback – 13 May 2011"
brand: "michael whitmanherbert mattord"
price: "592 zł"
currency: PLN
in_stock: true
reviews_count: 5
category: "Books"
url: https://www.desertcart.pl/products/86582801-roadmap-to-information-security-for-it-and-infosec-managers-paperback
store_origin: PL
region: Poland
---

# Roadmap to Information Security: For IT and Infosec Managers Paperback – 13 May 2011

**Brand:** michael whitmanherbert mattord
**Price:** 592 zł
**Availability:** ✅ In Stock

## Quick Answers

- **What is this?** Roadmap to Information Security: For IT and Infosec Managers Paperback – 13 May 2011 by michael whitmanherbert mattord
- **How much does it cost?** 592 zł with free shipping
- **Is it available?** Yes, in stock and ready to ship
- **Where can I buy it?** [www.desertcart.pl](https://www.desertcart.pl/products/86582801-roadmap-to-information-security-for-it-and-infosec-managers-paperback)

## Best For

- michael whitmanherbert mattord enthusiasts

## Why This Product

- Trusted michael whitmanherbert mattord brand quality
- Free international shipping included
- Worldwide delivery with tracking
- 15-day hassle-free returns

## Description

Review
        	  
        	  
        		  
        			Part I: OVERVIEW OF THE SECURITY LANDSCAPE. 1. Introduction to the Roadmap to Information Security Roadmap. 2. Threats to Information Assets. 3. Attacks on Information Assets. Part II: STRATEGIC INFORMATION SECURITY: SECURITY GOVERNANCE. 4. Information Technology and Information Security Governance. 5. Information Security Roles and Responsibilities. 6. Positioning the Information Security Function. 7. Conducting an Information Security Assessment. Part III: STRATEGIC INFORMATION SECURITY: RISK MANAGEMENT. 8. Risk Management: Risk Identification. 9. Risk Management: Risk Assessment. 10. Risk Management: Risk Control. 11. Alternate Approaches to Risk Management. PART IV: STRATEGIC INFORMATION SECURITY: STANDARDS, REGULATIONS, LAW AND ETHICS. 12. Standards for Managing the Information Security Program. 13. Emerging Trends in Certification and Accreditation. 14. Dealing with Regulatory Compliance and Key Legal Issues. 15. Other Important Laws for Every IT/Security Manager. 16. Ethics in IT and Information Security. Part V: TACTICAL INFORMATION SECURITY: POLICIES AND PROGRAMS. 17. Information Security Policy: Development and Implementation. 18. Information Security Policy Types: EISP, ISSP, SysSP. 19. Employment Policies and Practices. 20. Implementing Security Education, Training, and Awareness Programs. Part VI: TACTICAL INFORMATION SECURITY: CONTINGENCY PLANNING. 21. Contingency Planning: Planning for the Worst. 22. The Incident Response Plan. 23. The Disaster Recovery Plan. 24. The Business Continuity Plan. Part VII: OPERATIONAL INFORMATION SECURITY: NETWORK SECURITY. 25. Communications and Operations Management. 26. Firewalls. 27. Protecting Remote Access. 28. Intrusion Detection Systems. 29. Scanning and Analysis Tools. Part VIII: OPERATIONAL INFORMATION SECURITY: CRYPTOGRAPHY AND ACCESS CONTROLS. 30. Cryptography in Theory. 31. Cryptography in Practice. 32. Access Controls and Biometrics. 33. Physical Security. Part IX: SUPPLEMENTAL MATERIALS. Appendix A: Information Security Self-Assessment Checklists. Appendix B: Information Security Certification Guidelines - The CISSP/SSCP. Appendix C: Information Security Certification Guidelines - The CISM.
				    	
			    	
        		  
        		  
        	
          
              
        	  	  About the Author
        	  
        	  
        		  
        			Herbert Mattord, Ph.D., CISM, CISSP, completed 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining the faculty at Kennesaw State University, where he is Assistant Chair of the Department of Information Systems and Associate Professor of Information Security and Assurance program. Dr. Mattord currently teaches graduate and undergraduate courses in Information Security and Assurance as well as Information Systems. He and Michael Whitman have authored PRINCIPLES OF INFORMATION SECURITY, MANAGEMENT OF INFORMATION SECURITY, READINGS AND CASES IN THE MANAGEMENT OF INFORMATION SECURITY, PRINCIPLES OF INCIDENT RESPONSE AND DISASTER RECOVERY, THE GUIDE TO NETWORK SECURITY, and THE HANDS-ON INFORMATION SECURITY LAB MANUAL, Dr. Mattord is an active researcher, author, and consultant in Information Security Management and related topics. He has published articles in the Information Resources Management Journal, Journal of Information Security Education, the Journal of Executive Education, and the International Journal of Interdisciplinary Telecommunications and Networking. Dr. Mattord is a member of the Information Systems Security Association, ISACA, and the Association for Information Systems. During his career as an IT practitioner, Dr. Mattord was an adjunct professor at Kennesaw State University, Southern Polytechnic State University in Marietta, Georgia, Austin Community College in Austin, Texas, and Texas State University: San Marcos. He was formerly the Manager of Corporate Information Technology Security at Georgia-Pacific Corporation, where he acquired much of the practical knowledge found in this and his other textbooks. Michael Whitman, Ph.D., CISM, CISSP, is Professor of Information Security at Kennesaw State University, Kennesaw, Georgia. He also serves as the Executive Director of the Center for Information Security Education, Coles College of Business. In 2004, 2007, 2012 and 2015, under his direction the Center for Information Security Education spearheaded KSU&apos;s successful bid for the prestigious National Center of Academic Excellence recognitions (CAE/IAE and CAE IA/CDE), awarded jointly by the Department of Homeland Security and the National Security Agency. Dr. Whitman is also the Editor-in-Chief of the Journal of Cybersecurity Education, Research and Practice, and is Director of the Southeast Collegiate Cyber Defense Competition. Dr. Whitman is an active researcher and author in Information Security Policy, Threats, Curriculum Development, and Ethical Computing. He currently teaches graduate and undergraduate courses in Information Security. Dr. Whitman has several information security textbooks currently in print, including PRINCIPLES OF INFORMATION SECURITY; MANAGEMENT OF INFORMATION SECURITY; READINGS AND CASES IN THE MANAGEMENT OF INFORMATION SECURITY, VOLUMES I AND II; THE HANDS-ON INFORMATION SECURITY LAB MANUAL; PRINCIPLES OF INCIDENT RESPONSE AND DISASTER RECOVERY; and THE GUIDE TO NETWORK SECURITY AND THE GUIDE TO FIREWALLS AND NETWORK SECURITY. He has published articles in Information Systems Research, the Communications of the ACM, the Journal of International Business Studies, Information and Management, and the Journal of Computer Information Systems. Dr. Whitman is a member of the Association for Computing Machinery, the Information Systems Security Association, ISACA and the Association for Information Systems. Previously, Dr. Whitman served the U.S. Army as an Automated Data Processing System Security Officer (ADPSSO).

## Technical Specifications

| Specification | Value |
|---------------|-------|
| Best Sellers Rank | #4,536,385 in Books ( See Top 100 in Books ) #2,377 in Computer Networking (Books) #3,246 in Computer Network Security |
| Customer Reviews | 4.6 4.6 out of 5 stars (18) |
| Dimensions  | 7 x 1 x 8.75 inches |
| Edition  | 1st |
| ISBN-10  | 1435480309 |
| ISBN-13  | 978-1435480308 |
| Item Weight  | 1.8 pounds |
| Language  | English |
| Print length  | 400 pages |
| Publication date  | May 13, 2011 |
| Publisher  | Cengage Learning |

## Images

![Roadmap to Information Security: For IT and Infosec Managers Paperback – 13 May 2011 - Image 1](https://images-na.ssl-images-amazon.com/images/I/512wjb-3wWL.jpg)
![Roadmap to Information Security: For IT and Infosec Managers Paperback – 13 May 2011 - Image 2](https://images-na.ssl-images-amazon.com/images/I/41a1CD-n%2BKL.jpg)

## Customer Reviews

### ⭐⭐⭐⭐⭐ 







  
  
    A Good Cybersecurity Read
  

*by F***R on 14 September 2017*









  
  
    Easy to ready, short chapters, content exactly what the book title suggests.
  


### ⭐⭐⭐⭐ 







  
  
    Beginners to Intermediate level book...good read
  

*by B***E on 7 September 2014*









  
  
    I really enjoy this series of books. Good for basics up through intermediate Security professionals.
  


### ⭐⭐⭐⭐ 







  
  
    Used this for class
  

*by B***T on 21 February 2013*









  
  
    I used this for two classes and a 4-H project, it's a great book!  I would buy this again, no regrets.
  


---

## Why Shop on Desertcart?

- 🛒 **Trusted by 1.3+ Million Shoppers** — Serving international shoppers since 2016
- 🌍 **Shop Globally** — Access 737+ million products across 21 categories
- 💰 **No Hidden Fees** — All customs, duties, and taxes included in the price
- 🔄 **15-Day Free Returns** — Hassle-free returns (30 days for PRO members)
- 🔒 **Secure Payments** — Trusted payment options with buyer protection
- ⭐ **TrustPilot Rated 4.5/5** — Based on 8,000+ happy customer reviews

**Shop now:** [https://www.desertcart.pl/products/86582801-roadmap-to-information-security-for-it-and-infosec-managers-paperback](https://www.desertcart.pl/products/86582801-roadmap-to-information-security-for-it-and-infosec-managers-paperback)

---

*Product available on Desertcart Poland*
*Store origin: PL*
*Last updated: 2026-04-25*