000 03016cam a2200397 i 4500
001 21028018
003 PCN
005 20221026115827.0
008 190620s2020 nju 001 0 eng
010 _a 2019024454
020 _a9781119517207
_q(hardback)
020 _z9781119517290
_q(adobe pdf)
020 _z9781119517320
_q(epub)
040 _aDLC
_beng
_erda
_cDLC
_dDLC
042 _apcc
043 _an-us---
050 0 0 _aKF1263.C65
_bK67 2020
082 0 0 _a343.7309/99
_223
100 1 _aKosseff, Jeff,
_d1978-
_eauthor.
245 1 0 _aCybersecurity law /
_cJeff Kosseff.
250 _aSecond edition.
264 1 _aHoboken, NJ :
_bWiley,
_c2020.
264 4 _c©2020
300 _axxxi, 725 pages ;
_c24 cm
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
365 _b368.69
_cRM
500 _aIncludes index.
505 0 _aData security laws and enforcement actions -- Cybersecurity litigation --Cybersecurity requirements for specific industries -- Cybersecurity and corporate governance -- Anti-hacking laws -- U.S. government cyber structure and public-private cybersecurity partnerships -- Surveillance and cyber -- Cybersecurity and federal government contractors -- Privacy laws -- International cybersecurity law -- Cyber and the law of war.
520 _a"This timely book summarizes the key statutes, regulations, and court rulings for use in undergraduate and graduate level courses in cybersecurity, cyber operations, management-oriented information technology (IT), and computer science. New material includes many expanded sections, such as the addition more recent FTC data security consent decrees, including Ashley Madison, Uber, and Lenovo. The author also added the latest developments in the LabMD case, which was discussed in the first edition. This new edition also includes an overview of the new bills introduced by lawmakers in Congress to set national standards for data breach notifications and data security. There is a new section on government agency guidance and rules for cybersecurity of connected devices, such as vehicles, medical devices, and webcams. Bitcoin and other cryptocurrency have spurred a number of cybersecurity concerns and proposals for new laws and regulations, which are addressed in this new edition. This book also explores the limits on cyber activities during an active war. In particular, this new edition examines restrictions on harm to neutral states and civilians (and civilian infrastructure), and the unique constraints that these limits place on cyber warfare"--
_cProvided by publisher.
650 0 _aData protection
_xLaw and legislation
_zUnited States.
650 0 _aComputer security
_xLaw and legislation
_zUnited States.
856 _3Francis Light Digital Collection
_uhttps://penisulacollegenorthern-my.sharepoint.com/:b:/g/personal/noorshahidah_peninsulamalaysia_edu_my/EfUwNCVw0e5MvgpyRM62XwcBrChg7fQapi_eURCn13bWgg?e=OP6h0U
942 _2ddc
_cOPEN SHELF
999 _c464
_d464