• RRP: £49.99
  • You Save: £17.50 (35%)
FREE Delivery in the UK.
Only 3 left in stock (more on the way).
Dispatched from and sold by Amazon. Gift-wrap available.
Information Security: The... has been added to your Basket
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 3 images

Information Security: The Complete Reference, Second Edition Paperback – 1 May 2013

5 out of 5 stars 1 customer review

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
"Please retry"
"Please retry"
£32.34 £32.42
Note: This item is eligible for click and collect. Details
Pick up your parcel at a time and place that suits you.
  • Choose from over 13,000 locations across the UK
  • Prime members get unlimited deliveries at no additional cost
How to order to an Amazon Pickup Location?
  1. Find your preferred location and add it to your address book
  2. Dispatch to this address when you check out
Learn more
£32.49 FREE Delivery in the UK. Only 3 left in stock (more on the way). Dispatched from and sold by Amazon. Gift-wrap available.

Frequently Bought Together

  • Information Security: The Complete Reference, Second Edition
  • +
  • Information Security Management Principles
  • +
  • Information Risk Management: A Practitioner's Guide (Chartered Institute for It)
Total price: £78.72
Buy the selected items together

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone

To get the free app, enter your e-mail address or mobile phone number.

Product details

  • Paperback: 896 pages
  • Publisher: McGraw-Hill Osborne; 2 edition (1 May 2013)
  • Language: English
  • ISBN-10: 0071784357
  • ISBN-13: 978-0071784351
  • Product Dimensions: 4.4 x 18.4 x 22.9 cm
  • Average Customer Review: 5.0 out of 5 stars  See all reviews (1 customer review)
  • Amazon Bestsellers Rank: 496,940 in Books (See Top 100 in Books)
  • See Complete Table of Contents

Product Description

About the Author

Mark Rhodes-Ousley has 20 years of experience with every aspect of security, from program management to technology. That experience includes risk management, security policies, security management, technology implementation and operations, physical security, disaster recovery, and business continuity planning. He holds two core beliefs: that business processes are just as important as technology because security relies on people; and that security should be a business enabler with a goal of enhancing the customer experience. Mark is CISSP, CISM, and MCSE certified.

Inside This Book

(Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

5.0 out of 5 stars
5 star
4 star
3 star
2 star
1 star
See the customer review
Share your thoughts with other customers

Top Customer Reviews

Format: Paperback Verified Purchase
This book has been one of the best IT books I have ever read. An excellent reference guide for all aspects in IT Security, written in a very well-structured and perfectly documented plain English language. It is written in an Executive style going into some technical details - but not too many to destroy the style - when the subject requires it. There's a wealth of references for the best books around at the end of each chapter that allows the reader regardless of his/her level of familiarization with a specific subject to delve as deep as they wish.
Hardly found any mistakes or typos in more than 800 pages of text, making the book very easy to read, understand, assimilate and refer back to any subject when needed.
Comment 1 of 1 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: HASH(0x8eae26c0) out of 5 stars 4 reviews
2 of 2 people found the following review helpful
HASH(0x8eaf3c24) out of 5 stars Great overall resource for IT security matters 23 July 2014
By David K - Published on Amazon.com
Format: Kindle Edition Verified Purchase
As a business manager with responsibility for IT, I found th oily s book invaluable in understanding many of the issues impacting our information security posture and the processes and technologies affecting them. I recommend this book to anyone who needs to get a comprehensive understanding of the current threats to securing their organization's information.
8 of 17 people found the following review helpful
HASH(0x8eaf3e7c) out of 5 stars A note from the author 24 April 2013
By Mark Rhodes-Ousley - Published on Amazon.com
Format: Paperback
The following contributors and peer reviewers provided indispensable thought leadership that greatly improved the quality of this book. I'd like to recognize their contributions and express my gratitude for their work.

- Andrew Abbate, principal consultant and partner at Convergent Computing.
- Barrington Allen, technical expert
- Brian Baker, EMC Storage Specialist
- Zheng Bu, security researcher at McAfee
- Brian Buege, Director of Engineering at Spirent Communications
- Anil Desai, author and independent consultant specializing in Microsoft technologies
- Leo Dregier, principal at the computer security firm The Security Matrix, LLC
- Dr. Nick Efford, senior teaching fellow in the School of Computing at the University of Leeds
- Thaddeus Fortenberry, specializes in complete security plans for remote deployments that address real-world issues and protection
- Christian Genetski, Senior Vice President and General Counsel at the Entertainment Software Association.
- Christine Grayban, Enterprise Security practice lead for Stach & Liu
- Roger A. Grimes, author and consultant
- Gregory Hoban, Senior Systems Engineer
- Michael Howard, Principal CyberSecurity Architect at Microsoft
- Ayush Jain, Senior IT Infrastructure Manager
- Michael Judd, Senior Application Engineer at FTEN
- Dr. Bryan Kissinger, author, security professional, and healthcare and technology sector specialist
- Thomas Knox, Streaming Media Engineer at Comcast
- Brenda Larcom, Senior Security Consultant and cofounder of an open source threat modeling methodology
- Eric Milam, Principal Security Assessor and project steward for the Ettercap project
- Michael T. Raggo, Product Manager at AirDefense
- Eric Reither, Vice President and a Senior Security Consultant at Security by Design Inc.
- Ben Rothke, Corporate Services Information Security Manager at Wyndham Worldwide
- Zeke Rutman-Allen, fanatical technologist and Senior Manager, Global Network Services for a multibillion dollar green energy company
- Stephen Singam, CTO at Hewlett-Packard
- Keith Strassberg, CEO/CTO of Universal Survey
- Simon Thorpe, Microsoft AD RMS technology specialist
- Dr. Andrew A. Vladimirov, Chief Security Manager for Arhont Information Security Ltd.
- Barak Weichselbaum, network and security consultant who started in the Israeli Defense Forces and served in the intelligence corps, and is now founder and CEO of B.W. Komodia Ltd.
- Marcia Wilson, information technology veteran who has focused on information security for the last decade
3 of 10 people found the following review helpful
HASH(0x8eaf60d8) out of 5 stars safes my live 19 July 2013
By pedro - Published on Amazon.com
Format: Kindle Edition Verified Purchase
Read it. This book helps me to define a security structure to an enterprise at Mexico that nobody knows how to do tjat
0 of 20 people found the following review helpful
By penbuyer - Published on Amazon.com
Format: Paperback Verified Purchase
Arrived in a timely manner and in good condition. I had to buy this book as part of a masters degree cert program. Didn't really read it but it appears to be a well written book.
Were these reviews helpful? Let us know