Welcome to Francis Light Library | francislightlibrary@peninsulamalaysia.edu.my | +604-545 600 EXt:8004
Image from Google Jackets

Cybersecurity law / Jeff Kosseff.

By: Publisher: Hoboken, NJ : Wiley, 2020Copyright date: ©2020Edition: Second editionDescription: xxxi, 725 pages ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781119517207
Subject(s): DDC classification:
  • 343.7309/99 23
LOC classification:
  • KF1263.C65 K67 2020
Online resources:
Contents:
Data security laws and enforcement actions -- Cybersecurity litigation --Cybersecurity requirements for specific industries -- Cybersecurity and corporate governance -- Anti-hacking laws -- U.S. government cyber structure and public-private cybersecurity partnerships -- Surveillance and cyber -- Cybersecurity and federal government contractors -- Privacy laws -- International cybersecurity law -- Cyber and the law of war.
Summary: "This timely book summarizes the key statutes, regulations, and court rulings for use in undergraduate and graduate level courses in cybersecurity, cyber operations, management-oriented information technology (IT), and computer science. New material includes many expanded sections, such as the addition more recent FTC data security consent decrees, including Ashley Madison, Uber, and Lenovo. The author also added the latest developments in the LabMD case, which was discussed in the first edition. This new edition also includes an overview of the new bills introduced by lawmakers in Congress to set national standards for data breach notifications and data security. There is a new section on government agency guidance and rules for cybersecurity of connected devices, such as vehicles, medical devices, and webcams. Bitcoin and other cryptocurrency have spurred a number of cybersecurity concerns and proposals for new laws and regulations, which are addressed in this new edition. This book also explores the limits on cyber activities during an active war. In particular, this new edition examines restrictions on harm to neutral states and civilians (and civilian infrastructure), and the unique constraints that these limits place on cyber warfare"-- Provided by publisher.
List(s) this item appears in: Newest Publication
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Shelving location Call number URL Status Notes Date due Barcode Course reserves
ACADEMIC ACADEMIC FRANCIS LIGHT LIBRARY SHELVES 2 343.7309/99 KOS (Browse shelf(Opens below)) Link to resource Available DCS2343 (CyberLaw) 00000575

Diploma in Computer Science

E-Book E-Book FRANCIS LIGHT LIBRARY SHELVES 2 Link to resource Available DCS2343 (CyberLaw) ebook0000032

Diploma in Computer Science

Includes index.

Data security laws and enforcement actions -- Cybersecurity litigation --Cybersecurity requirements for specific industries -- Cybersecurity and corporate governance -- Anti-hacking laws -- U.S. government cyber structure and public-private cybersecurity partnerships -- Surveillance and cyber -- Cybersecurity and federal government contractors -- Privacy laws -- International cybersecurity law -- Cyber and the law of war.

"This timely book summarizes the key statutes, regulations, and court rulings for use in undergraduate and graduate level courses in cybersecurity, cyber operations, management-oriented information technology (IT), and computer science. New material includes many expanded sections, such as the addition more recent FTC data security consent decrees, including Ashley Madison, Uber, and Lenovo. The author also added the latest developments in the LabMD case, which was discussed in the first edition. This new edition also includes an overview of the new bills introduced by lawmakers in Congress to set national standards for data breach notifications and data security. There is a new section on government agency guidance and rules for cybersecurity of connected devices, such as vehicles, medical devices, and webcams. Bitcoin and other cryptocurrency have spurred a number of cybersecurity concerns and proposals for new laws and regulations, which are addressed in this new edition. This book also explores the limits on cyber activities during an active war. In particular, this new edition examines restrictions on harm to neutral states and civilians (and civilian infrastructure), and the unique constraints that these limits place on cyber warfare"-- Provided by publisher.

There are no comments on this title.

to post a comment.

The Ship Campus, No.1 Education Boulevard,One Auto Hub, Batu Kawan Industrial Park,14110, Bandar Cassia, Penang,Malaysia.Phone: +604 585 5000 Fax: +604 585 5009 | Email: noorshahidah@penisulacollege.edu.my 

Powered by KOHA |© Maintained by WISERF