Cybersecurity law:
Data security laws and enforcement actions -- Cybersecurity litigation -- Cybersecurity requirements for specific industries -- Cybersecurity and corporae governance -- Anti-hacking laws -- Public-private cybersecurity partnerships -- Surveillance and cyber -- Cybersecurity and federal government co...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ
John Wiley & Sons
2017
|
Schlagworte: | |
Online-Zugang: | UBY01 https://onlinelibrary.wiley.com/doi/book/10.1002/9781119517436 |
Zusammenfassung: | Data security laws and enforcement actions -- Cybersecurity litigation -- Cybersecurity requirements for specific industries -- Cybersecurity and corporae governance -- Anti-hacking laws -- Public-private cybersecurity partnerships -- Surveillance and cyber -- Cybersecurity and federal government contractors -- Privacy laws -- International cybersecurity laws Expanding on the author's experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information safeguarding, law enforcement surveillance, cybercriminal combat, privacy, and many other cybersecurity issues. Written in an accessible manner, the book provides real-world examples and case studies to help readers understand the practical applications of the presented material. The book begins by outlining the legal requirements for data security, which synthesizes the Federal Trade Commission's cybersecurity cases in order to provide the background of the FTC's views on data security. The book also examines data security requirements imposed by a growing number of state legislatures and private litigation arising from data breaches. Anti-hacking laws, such as the federal Computer Fraud and Abuse Act, Economic Espionage Act, and the Digital Millennium Copyright Act, and how companies are able to fight cybercriminals while ensuring compliance with the U.S. Constitution and statutes are discussed thoroughly. Cybersecurity Law is appropriate as a textbook for undergraduate and graduate-level courses in cybersecurity, cybersecurity law, cyber operations, management-oriented information technology (IT), and computer science. This book is also an ideal reference for lawyers, IT professionals, government personnel, business managers, IT management personnel, auditors, and cybersecurity insurance providers. -- Provided by publisher |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xxvii, 496 pages) |
ISBN: | 9781119517436 1119517435 |
Internformat
MARC
LEADER | 00000nmm a22000001c 4500 | ||
---|---|---|---|
001 | BV047190658 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 210311s2017 xxu|||| o||u| ||||||eng d | ||
020 | |a 9781119517436 |c electronic bk |9 978-1-119-51743-6 | ||
020 | |a 1119517435 |c electronic bk |9 1-119-51743-5 | ||
024 | 7 | |a 10.1002/9781119517436 |2 doi | |
035 | |a (ZDB-35-WIC)9781119517436 | ||
035 | |a (OCoLC)1124766961 | ||
035 | |a (DE-599)KEP049964542 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-706 | ||
050 | 0 | |a KF1263.C65 | |
082 | 0 | |a 343.7309/99 | |
100 | 1 | |a Kosseff, Jeff |d 1978- |e Verfasser |0 (DE-588)1171568215 |4 aut | |
245 | 1 | 0 | |a Cybersecurity law |c Jeff Kosseff |
264 | 1 | |a Hoboken, NJ |b John Wiley & Sons |c 2017 | |
300 | |a 1 Online-Ressource (xxvii, 496 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | 3 | |a Data security laws and enforcement actions -- Cybersecurity litigation -- Cybersecurity requirements for specific industries -- Cybersecurity and corporae governance -- Anti-hacking laws -- Public-private cybersecurity partnerships -- Surveillance and cyber -- Cybersecurity and federal government contractors -- Privacy laws -- International cybersecurity laws | |
520 | 3 | |a Expanding on the author's experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information safeguarding, law enforcement surveillance, cybercriminal combat, privacy, and many other cybersecurity issues. Written in an accessible manner, the book provides real-world examples and case studies to help readers understand the practical applications of the presented material. The book begins by outlining the legal requirements for data security, which synthesizes the Federal Trade Commission's cybersecurity cases in order to provide the background of the FTC's views on data security. The book also examines data security requirements imposed by a growing number of state legislatures and private litigation arising from data breaches. Anti-hacking laws, such as the federal Computer Fraud and Abuse Act, Economic Espionage Act, and the Digital Millennium Copyright Act, and how companies are able to fight cybercriminals while ensuring compliance with the U.S. Constitution and statutes are discussed thoroughly. Cybersecurity Law is appropriate as a textbook for undergraduate and graduate-level courses in cybersecurity, cybersecurity law, cyber operations, management-oriented information technology (IT), and computer science. This book is also an ideal reference for lawyers, IT professionals, government personnel, business managers, IT management personnel, auditors, and cybersecurity insurance providers. -- Provided by publisher | |
650 | 0 | 7 | |a Recht |0 (DE-588)4048737-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | 0 | |a Computer security / Law and legislation / United States | |
653 | 0 | |a Data protection / Law and legislation / United States | |
653 | 0 | |a Hacking / United States / Prevention | |
653 | 0 | |a Cyberterrorism / Prevention | |
653 | 0 | |a Privacy, Right of / United States | |
653 | 0 | |a Computer networks / Security measures | |
653 | 0 | |a Computer security / Law and legislation | |
653 | 0 | |a Computer networks ; Security measures | |
653 | 0 | |a Computer security ; Law and legislation | |
653 | 0 | |a Cyberterrorism ; Prevention | |
653 | 0 | |a Data protection ; Law and legislation | |
653 | 0 | |a Privacy, Right of | |
653 | 0 | |a United States | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Recht |0 (DE-588)4048737-4 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | |z 9781119231509 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |t Cybersecurity law |d Hoboken, NJ : John Wiley & Sons, 2017 |
856 | 4 | 0 | |m X:WILEY |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119517436 |x Verlag |
912 | |a ZDB-35-UBC |a ZDB-35-WIC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032595861 | ||
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119517436 |l UBY01 |p ZDB-35-WIC |q UBY_PDA_WIC_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182289089822720 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Kosseff, Jeff 1978- |
author_GND | (DE-588)1171568215 |
author_facet | Kosseff, Jeff 1978- |
author_role | aut |
author_sort | Kosseff, Jeff 1978- |
author_variant | j k jk |
building | Verbundindex |
bvnumber | BV047190658 |
callnumber-first | K - Law |
callnumber-label | KF1263 |
callnumber-raw | KF1263.C65 |
callnumber-search | KF1263.C65 |
callnumber-sort | KF 41263 C65 |
callnumber-subject | KF - United States |
collection | ZDB-35-UBC ZDB-35-WIC |
ctrlnum | (ZDB-35-WIC)9781119517436 (OCoLC)1124766961 (DE-599)KEP049964542 |
dewey-full | 343.7309/99 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 343 - Military, tax, trade & industrial law |
dewey-raw | 343.7309/99 |
dewey-search | 343.7309/99 |
dewey-sort | 3343.7309 299 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft |
discipline_str_mv | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04385nmm a22006371c 4500</leader><controlfield tag="001">BV047190658</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210311s2017 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119517436</subfield><subfield code="c">electronic bk</subfield><subfield code="9">978-1-119-51743-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119517435</subfield><subfield code="c">electronic bk</subfield><subfield code="9">1-119-51743-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781119517436</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)9781119517436</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1124766961</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP049964542</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">KF1263.C65</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">343.7309/99</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kosseff, Jeff</subfield><subfield code="d">1978-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1171568215</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity law</subfield><subfield code="c">Jeff Kosseff</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">John Wiley & Sons</subfield><subfield code="c">2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvii, 496 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Data security laws and enforcement actions -- Cybersecurity litigation -- Cybersecurity requirements for specific industries -- Cybersecurity and corporae governance -- Anti-hacking laws -- Public-private cybersecurity partnerships -- Surveillance and cyber -- Cybersecurity and federal government contractors -- Privacy laws -- International cybersecurity laws</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Expanding on the author's experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information safeguarding, law enforcement surveillance, cybercriminal combat, privacy, and many other cybersecurity issues. Written in an accessible manner, the book provides real-world examples and case studies to help readers understand the practical applications of the presented material. The book begins by outlining the legal requirements for data security, which synthesizes the Federal Trade Commission's cybersecurity cases in order to provide the background of the FTC's views on data security. The book also examines data security requirements imposed by a growing number of state legislatures and private litigation arising from data breaches. Anti-hacking laws, such as the federal Computer Fraud and Abuse Act, Economic Espionage Act, and the Digital Millennium Copyright Act, and how companies are able to fight cybercriminals while ensuring compliance with the U.S. Constitution and statutes are discussed thoroughly. Cybersecurity Law is appropriate as a textbook for undergraduate and graduate-level courses in cybersecurity, cybersecurity law, cyber operations, management-oriented information technology (IT), and computer science. This book is also an ideal reference for lawyers, IT professionals, government personnel, business managers, IT management personnel, auditors, and cybersecurity insurance providers. -- Provided by publisher</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Law and legislation / United States</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data protection / Law and legislation / United States</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Hacking / United States / Prevention</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberterrorism / Prevention</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Privacy, Right of / United States</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Law and legislation</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security ; Law and legislation</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberterrorism ; Prevention</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data protection ; Law and legislation</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">United States</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="z">9781119231509</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="t">Cybersecurity law</subfield><subfield code="d">Hoboken, NJ : John Wiley & Sons, 2017</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="m">X:WILEY</subfield><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119517436</subfield><subfield code="x">Verlag</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-UBC</subfield><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032595861</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119517436</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBY_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047190658 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:47:47Z |
indexdate | 2024-07-10T09:05:11Z |
institution | BVB |
isbn | 9781119517436 1119517435 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032595861 |
oclc_num | 1124766961 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (xxvii, 496 pages) |
psigel | ZDB-35-UBC ZDB-35-WIC ZDB-35-WIC UBY_PDA_WIC_Kauf |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | John Wiley & Sons |
record_format | marc |
spelling | Kosseff, Jeff 1978- Verfasser (DE-588)1171568215 aut Cybersecurity law Jeff Kosseff Hoboken, NJ John Wiley & Sons 2017 1 Online-Ressource (xxvii, 496 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Data security laws and enforcement actions -- Cybersecurity litigation -- Cybersecurity requirements for specific industries -- Cybersecurity and corporae governance -- Anti-hacking laws -- Public-private cybersecurity partnerships -- Surveillance and cyber -- Cybersecurity and federal government contractors -- Privacy laws -- International cybersecurity laws Expanding on the author's experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information safeguarding, law enforcement surveillance, cybercriminal combat, privacy, and many other cybersecurity issues. Written in an accessible manner, the book provides real-world examples and case studies to help readers understand the practical applications of the presented material. The book begins by outlining the legal requirements for data security, which synthesizes the Federal Trade Commission's cybersecurity cases in order to provide the background of the FTC's views on data security. The book also examines data security requirements imposed by a growing number of state legislatures and private litigation arising from data breaches. Anti-hacking laws, such as the federal Computer Fraud and Abuse Act, Economic Espionage Act, and the Digital Millennium Copyright Act, and how companies are able to fight cybercriminals while ensuring compliance with the U.S. Constitution and statutes are discussed thoroughly. Cybersecurity Law is appropriate as a textbook for undergraduate and graduate-level courses in cybersecurity, cybersecurity law, cyber operations, management-oriented information technology (IT), and computer science. This book is also an ideal reference for lawyers, IT professionals, government personnel, business managers, IT management personnel, auditors, and cybersecurity insurance providers. -- Provided by publisher Recht (DE-588)4048737-4 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computer security / Law and legislation / United States Data protection / Law and legislation / United States Hacking / United States / Prevention Cyberterrorism / Prevention Privacy, Right of / United States Computer networks / Security measures Computer security / Law and legislation Computer networks ; Security measures Computer security ; Law and legislation Cyberterrorism ; Prevention Data protection ; Law and legislation Privacy, Right of United States Computersicherheit (DE-588)4274324-2 s Recht (DE-588)4048737-4 s DE-604 9781119231509 Erscheint auch als Druck-Ausgabe Cybersecurity law Hoboken, NJ : John Wiley & Sons, 2017 X:WILEY https://onlinelibrary.wiley.com/doi/book/10.1002/9781119517436 Verlag |
spellingShingle | Kosseff, Jeff 1978- Cybersecurity law Recht (DE-588)4048737-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4048737-4 (DE-588)4274324-2 |
title | Cybersecurity law |
title_auth | Cybersecurity law |
title_exact_search | Cybersecurity law |
title_exact_search_txtP | Cybersecurity law |
title_full | Cybersecurity law Jeff Kosseff |
title_fullStr | Cybersecurity law Jeff Kosseff |
title_full_unstemmed | Cybersecurity law Jeff Kosseff |
title_short | Cybersecurity law |
title_sort | cybersecurity law |
topic | Recht (DE-588)4048737-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Recht Computersicherheit |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9781119517436 |
work_keys_str_mv | AT kosseffjeff cybersecuritylaw |