Cybersecurity Law / (Record no. 425)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02903cam a2200361 i 4500 |
| 001 - CONTROL NUMBER | |
| control field | 21028018 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | Urbe University |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20211108174405.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 190620s2020 nju 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2019024454 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781119517207 |
| Qualifying information | (hardback) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Cancelled/invalid ISBN | 9781119517290 |
| Qualifying information | (adobe pdf) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Cancelled/invalid ISBN | 9781119517320 |
| Qualifying information | (epub) |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | DLC |
| Language of cataloging | eng |
| Description conventions | rda |
| Transcribing agency | DLC |
| Modifying agency | DLC |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | pcc |
| 043 ## - GEOGRAPHIC AREA CODE | |
| Geographic area code | n-us--- |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | KF1263.C65 |
| Item number | K67 2020 |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 343.7309/99 |
| Edition number | 23 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Kosseff, Jeff, |
| Dates associated with a name | 1978- |
| Relator term | author. |
| 245 10 - TITLE STATEMENT | |
| Title | Cybersecurity Law / |
| Statement of responsibility, etc | Jeff Kosseff. |
| 250 ## - EDITION STATEMENT | |
| Edition statement | Second edition. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication, distribution, etc | Hoboken : |
| Name of publisher, distributor, etc | Wiley , |
| Date of publication, distribution, etc | 2020 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xxxi, 725 pages ; |
| Dimensions | 24 cm |
| 500 ## - GENERAL NOTE | |
| General note | Includes index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Data security laws and enforcement actions -- Cybersecurity litigation --Cybersecurity requirements for specific industries -- Cybersecurity and corporate governance -- Anti-hacking laws -- U.S. government cyber structure and public-private cybersecurity partnerships -- Surveillance and cyber -- Cybersecurity and federal government contractors -- Privacy laws -- International cybersecurity law -- Cyber and the law of war. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | "This timely book summarizes the key statutes, regulations, and court rulings for use in undergraduate and graduate level courses in cybersecurity, cyber operations, management-oriented information technology (IT), and computer science. New material includes many expanded sections, such as the addition more recent FTC data security consent decrees, including Ashley Madison, Uber, and Lenovo. The author also added the latest developments in the LabMD case, which was discussed in the first edition. This new edition also includes an overview of the new bills introduced by lawmakers in Congress to set national standards for data breach notifications and data security. There is a new section on government agency guidance and rules for cybersecurity of connected devices, such as vehicles, medical devices, and webcams. Bitcoin and other cryptocurrency have spurred a number of cybersecurity concerns and proposals for new laws and regulations, which are addressed in this new edition. This book also explores the limits on cyber activities during an active war. In particular, this new edition examines restrictions on harm to neutral states and civilians (and civilian infrastructure), and the unique constraints that these limits place on cyber warfare"-- |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Data protection |
| General subdivision | Law and legislation |
| Geographic subdivision | United States. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer security |
| General subdivision | Law and legislation |
| Geographic subdivision | United States. |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
| Display text | Online version: |
| Main entry heading | Kosseff, Jeff, 1978- |
| Title | Cybersecurity law |
| Edition | Second edition. |
| Place, publisher, and date of publication | Hoboken, NJ : Wiley, 2020. |
| International Standard Book Number | 9781119517290 |
| Record control number | (DLC) 2019024455 |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) | |
| a | 7 |
| b | cbc |
| c | orignew |
| d | 1 |
| e | ecip |
| f | 20 |
| g | y-gencatlg |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Library of Congress Classification |
| Koha item type | Books |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type | Total Checkouts | Date checked out |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Library of Congress Classification | Non-fiction | URBE Library | URBE Library | General Stacks | 11/03/2021 | PURCHASE | KF1263.C65 K67 2020 C.1 | 0802 | 11/08/2021 | 1 | 11/08/2021 | Books | ||||||
| Library of Congress Classification | Non-fiction | URBE Library | URBE Library | General Stacks | 11/03/2021 | PURCHASE | KF1263.C65 K67 2020 C.2 | 0803 | 09/11/2025 | 2 | 11/08/2021 | Books | 1 | 08/26/2025 |