Jump to ratings and reviews
Rate this book

Principles of Information Security

Rate this book
Principles of Information Security examines the field of information security to prepare information systems students for their future roles as business decision-makers. This textbook presents a balance of the managerial and the technical aspects of the discipline and addresses knowledge areas of the CISSP (Certified Information Systems Security Professional) certification throughout. The authors discuss information security within a real-world context, by including examples of issues faced by today's professionals and by including tools, such as an opening vignette and "Offline" boxes with interesting sidebar stories in each chapter. Principles of Information Security also offers extensive opportunities for hands-on work.

576 pages, Paperback

First published December 1, 2002

35 people are currently reading
368 people want to read

About the author

Michael E. Whitman

37 books5 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
45 (21%)
4 stars
61 (28%)
3 stars
70 (33%)
2 stars
23 (10%)
1 star
12 (5%)
Displaying 1 - 21 of 21 reviews
Profile Image for Mel.
617 reviews14 followers
June 9, 2012
My god, this is the most boring book I've ever read. I had to read it for uni, but gosh, it's been a struggle. It's all 'pie in the sky' security information rather then anything even half way practical. If you don't have to DON'T READ IT
2 reviews
September 28, 2022
Wow what edition are they on? Way to keep the racket going. Outdated info mixed with as much useless jargon they could find to produce this. Looking forward to the endless red tape people like this will create when info sec becomes standardized by the gov.
Profile Image for Major Doug.
577 reviews9 followers
July 12, 2018
It was more about theory and physical security than network/system practicalities
Profile Image for David.
1,162 reviews58 followers
July 25, 2016
As required college overview reading, I guess this book would be OK. Its ivory tower is showing. But the crypto chapter (chapter 8) is pretty bad.

On P350 and P389, they refer to 3DES as a 128-bit cipher. But on P366 they change their minds and write "3DES uses three 64-bit keys for an overall key length of 192 bits". Both were wrong. DES only uses 56 of 64 bits for encrypting/decrypting, so 3DES is 168 bit -- not that it's even close to a 168-bit strength against a brute force attack.

They then say the Vernam Cipher is "also known as the one-time pad". Except that the Vernam cipher's keying material repeats when used up (that's why a one-time pad is not called a two or three time pad).

They also discuss old standards that went no where that no one uses, as if they are legitimate competing alternatives (examples, SESAME and S-HTTP). And their crypto chapter discusses S-HTTP, but doesn't even once mention TLS.

These gripes all pertain to the 4th edition (2011).
1 review
Want to read
September 9, 2016
none
This entire review has been hidden because of spoilers.
5 reviews
December 6, 2008
Required reading for my class but a good enough read I took the time to add it on. Well written, keeps the info entertaining. A good read if you are newer in the information security scene. Bad thing is it is a textbook so it was $70 or so. Not sure if it is worth that if not needed for class, so you might wait till a bit older or check the first/second edition (not sure how good they are though).
Profile Image for Bob.
16 reviews1 follower
December 25, 2011
This is an excellent book to read about information technology. It goes into great details about all the security issues we face today involving information. In particular, that internet is a bad neighborhood of its own; yet, many resort to it through daily activities believing that they are safe from harms way.
Profile Image for Aaron.
1 review
July 25, 2015
I read this as recommended reading for my university course. While there were a number of key concepts I picked up, there was also a lot of real estate wasted on excessive detail that I don't think added anything.

Half of the book helped me to sleep, while the other half provided interesting reading.
Profile Image for Aseel.
227 reviews4 followers
June 2, 2013
Required reading for my class and it was great
This book gave me a clear view of security components
Good for beginners in this field
It is not avaliable in many libraries
but you could buy it online
Profile Image for Geir.
74 reviews10 followers
November 3, 2014
Great for history, theory and concepts, but this edition (the third) was a bit behind the times on current standards. Make sure you get the latest edition. As of today, 4th ed from 2012 is the good stuff.
Profile Image for Beck Frost.
313 reviews14 followers
March 30, 2015
General concepts and dated content. Might have been relevant about 10 years ago. Had to read for school, and even the instructor taking over the class talked about how bad this book is and can't wait to get a new book approved for the next sessions of the course.
Profile Image for Ross Gerard.
1 review
November 24, 2012
Well require references and further studies to master. Knowledge of Algebra, Discrete Mathematics, Computer Hardware, and Networks recommended.
Profile Image for Bob.
36 reviews
June 14, 2015
I am using this text book to teach. I find it useful to discuss current security issues.
Profile Image for Akhtar Ali.
1 review
Want to read
November 29, 2018
I have not seen or read the book yet. I dont know How I can say anything about the book
Displaying 1 - 21 of 21 reviews

Can't find what you're looking for?

Get help and learn more about the design.