| 000 | 02903cam a2200361 i 4500 | ||
|---|---|---|---|
| 001 | 21028018 | ||
| 003 | Urbe University | ||
| 005 | 20211108174405.0 | ||
| 008 | 190620s2020 nju 001 0 eng | ||
| 010 | _a 2019024454 | ||
| 020 |
_a9781119517207 _q(hardback) |
||
| 020 |
_z9781119517290 _q(adobe pdf) |
||
| 020 |
_z9781119517320 _q(epub) |
||
| 040 |
_aDLC _beng _erda _cDLC _dDLC |
||
| 042 | _apcc | ||
| 043 | _an-us--- | ||
| 050 | 0 | 0 |
_aKF1263.C65 _bK67 2020 |
| 082 | 0 | 0 |
_a343.7309/99 _223 |
| 100 | 1 |
_aKosseff, Jeff, _d1978- _eauthor. |
|
| 245 | 1 | 0 |
_aCybersecurity Law / _cJeff Kosseff. |
| 250 | _aSecond edition. | ||
| 260 |
_aHoboken : _bWiley , _c2020 |
||
| 300 |
_axxxi, 725 pages ; _c24 cm |
||
| 500 | _aIncludes index. | ||
| 505 | 0 | _aData security laws and enforcement actions -- Cybersecurity litigation --Cybersecurity requirements for specific industries -- Cybersecurity and corporate governance -- Anti-hacking laws -- U.S. government cyber structure and public-private cybersecurity partnerships -- Surveillance and cyber -- Cybersecurity and federal government contractors -- Privacy laws -- International cybersecurity law -- Cyber and the law of war. | |
| 520 | _a"This timely book summarizes the key statutes, regulations, and court rulings for use in undergraduate and graduate level courses in cybersecurity, cyber operations, management-oriented information technology (IT), and computer science. New material includes many expanded sections, such as the addition more recent FTC data security consent decrees, including Ashley Madison, Uber, and Lenovo. The author also added the latest developments in the LabMD case, which was discussed in the first edition. This new edition also includes an overview of the new bills introduced by lawmakers in Congress to set national standards for data breach notifications and data security. There is a new section on government agency guidance and rules for cybersecurity of connected devices, such as vehicles, medical devices, and webcams. Bitcoin and other cryptocurrency have spurred a number of cybersecurity concerns and proposals for new laws and regulations, which are addressed in this new edition. This book also explores the limits on cyber activities during an active war. In particular, this new edition examines restrictions on harm to neutral states and civilians (and civilian infrastructure), and the unique constraints that these limits place on cyber warfare"-- | ||
| 650 | 0 |
_aData protection _xLaw and legislation _zUnited States. |
|
| 650 | 0 |
_aComputer security _xLaw and legislation _zUnited States. |
|
| 776 | 0 | 8 |
_iOnline version: _aKosseff, Jeff, 1978- _tCybersecurity law _bSecond edition. _dHoboken, NJ : Wiley, 2020. _z9781119517290 _w(DLC) 2019024455 |
| 906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
| 942 |
_2lcc _cBK |
||
| 999 |
_c425 _d425 |
||