|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_on1089582741 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
190309s2019 nyu ob 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d TEFOD
|d MERUC
|d CHVBK
|d OCLCO
|d NYBEP
|d UKAHL
|d OCLCF
|d UWO
|d N$T
|d OCLCQ
|d UMI
|d YDX
|d YDXIT
|d CNO
|d WAU
|d HF9
|d OCLCQ
|d LIP
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 1088746244
|a 1096283024
|a 1110599483
|a 1122763629
|
020 |
|
|
|a 1948976730
|
020 |
|
|
|a 9781948976725
|q (print)
|
020 |
|
|
|a 1948976722
|
020 |
|
|
|a 9781948976732
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000065929684
|
029 |
1 |
|
|a CHNEW
|b 001040540
|
029 |
1 |
|
|a CHVBK
|b 559029039
|
035 |
|
|
|a (OCoLC)1089582741
|z (OCoLC)1088746244
|z (OCoLC)1096283024
|z (OCoLC)1110599483
|z (OCoLC)1122763629
|
037 |
|
|
|a ADA3B6F7-C7EF-4660-BBC6-FA6878628C2B
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.A25
|b .B738 2019
|
082 |
0 |
4 |
|a 342.0858
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Brathwaite, Shimon,
|e author
|
245 |
1 |
0 |
|a Cybersecurity law :
|b protect yourself and your customers /
|c Shimon Brathwaite.
|
260 |
|
|
|a New York :
|b Business Expert Press,
|c 2019.
|
300 |
|
|
|a 1 online resource (x, 91 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Chapter 1: Introduction to Information Security Law -- Chapter 2: Cyber Law and Intellectual Property -- Chapter 3: What Are the Corporate Requirements for Cybersecurity? -- Chapter 4: What Are the Financial and Reputational Implications of Information Security Legislation -- Chapter 5: Required Encryption Standards -- Chapter 6: How to Offload Legal Liability onto Third Parties -- Chapter 7: The Importance of Cybersecurity Specific Insurance -- Chapter 8: What Type of People and Policies Should You Have to Ensure You Are Complying with Regulations -- Chapter 9: Interacting with Law Enforcement -- Chapter 10: Recap and Conclusion; About the Author; Index; Adpage; Backcover
|
520 |
3 |
|
|a This book gives insight into the legal aspects of data ownership in the 21st century. With the amount of information being produced and collected growing at an ever accelerating rate, governments are implementing laws to regulate the use of this information by corporations. Companies are more likely than ever to face heavy lawsuits and sanctions for any misuse of information, which includes data breaches caused by cybercriminals. This book serves as a guide to all companies that collect customer information, by giving instructions on how to avoid making these costly mistakes and to ensure they are not liable in the event of stolen information. -- Provided by publisher.
|
504 |
|
|
|a Includes bibliographical references.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security
|2 fast
|
758 |
|
|
|i has work:
|a Cybersecurity law (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFH9XwGBMKWygpC9Fh4FGb
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Brathwaite, Shimon.
|t Cybersecurity Law : Protect Yourself and Your Customers.
|d New York : Business Expert Press, ©2019
|z 9781948976725
|
830 |
|
0 |
|a Business law and corporate risk management collection.
|x 2333-6730
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5719658
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH35970891
|
938 |
|
|
|a Business Expert Press
|b BEPR
|n 9781948976732
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5719658
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2034436
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16077487
|
994 |
|
|
|a 92
|b IZTAP
|