Principles of cybersecurity law / (Record no. 7102)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 05043cam a2200709 i 4500 |
| 001 - CONTROL NUMBER | |
| control field | on1260664221 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OCoLC |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20230828121007.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 210720t20212021mnua b 001 0 eng c |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | YDX |
| Language of cataloging | eng |
| Transcribing agency | YDX |
| Modifying agency | UKMGB |
| -- | WVU |
| -- | BDX |
| -- | OCLCO |
| -- | XND |
| -- | GWL |
| -- | TLK |
| -- | TXQ |
| -- | OCLCF |
| -- | OCLCO |
| -- | UTV |
| -- | OCLCA |
| -- | OCLCO |
| 015 ## - NATIONAL BIBLIOGRAPHY NUMBER | |
| National bibliography number | GBC1B8168 |
| Source | bnb |
| 016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER | |
| Record control number | 020272508 |
| Source | Uk |
| 019 ## - | |
| -- | 1263877905 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781636590202 |
| Qualifying information | (paperback) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 1636590209 |
| Qualifying information | (paperback) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Cancelled/invalid ISBN | 9781636595474 |
| Qualifying information | (electronic book) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Cancelled/invalid ISBN | 1636595472 |
| Qualifying information | (electronic book) |
| 029 1# - (OCLC) | |
| OCLC library identifier | UKMGB |
| System control number | 020272508 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (OCoLC)1260664221 |
| Canceled/invalid control number | (OCoLC)1263877905 |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | pcc |
| 043 ## - GEOGRAPHIC AREA CODE | |
| Geographic area code | n-us--- |
| 050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | KF1263.C65 |
| Item number | M57 2021 |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 343.0999 |
| Edition number | 23 |
| 049 ## - LOCAL HOLDINGS (OCLC) | |
| Holding library | TZAA |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Mireles, Michael S. |
| Fuller form of name | (Michael Salomon), |
| Relator term | author. |
| 245 10 - TITLE STATEMENT | |
| Title | Principles of cybersecurity law / |
| Statement of responsibility, etc | Michael S. Mireles, Jack L. Hobaugh, Jr. |
| 246 18 - VARYING FORM OF TITLE | |
| Title proper/short title | Cybersecurity law |
| 246 3# - VARYING FORM OF TITLE | |
| Title proper/short title | Principles of cyber security law |
| 264 #1 - | |
| -- | St. Paul, MN : |
| -- | West Academic Publishing, |
| -- | [2021] |
| 264 #4 - | |
| -- | �2021 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | x, 239 pages : |
| Other physical details | illustrations ; |
| Dimensions | 24 cm. |
| 336 ## - | |
| -- | text |
| -- | rdacontent |
| 337 ## - | |
| -- | unmediated |
| -- | rdamedia |
| 338 ## - | |
| -- | volume |
| -- | rdacarrier |
| 490 1# - SERIES STATEMENT | |
| Series statement | Concise hornbook series |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc | Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Federal Trade Commission enforcement and cybersecurity law -- The Gramm-Leach-Bliley Act and FTC safeguards rule -- U.S. Securities and Exchange Commission cybersecurity -- Health Insurance Portability and Accountability Act -- Family Education Rights and Privacy Act -- State cybersecurity laws -- Additional private causes of action for cybersecurity breaches -- Cybersecurity risk assessment and National Institute of Standards and Technology risk management framework -- Laws prohibiting and addressing hacking -- Internet of things -- An international perspective. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | "This book is for anyone interested in learning the cybersecurity laws that apply to an entity based on the entity's business model(s) and data collection model(s). For example, what is the applicable Securities and Exchange Commission (SEC) cybersecurity law if an entity provides an alternate trading platform (ATP) with a daily trading volume of 50,000? The authors combine technical and legal experience in providing a map for cybersecurity counseling based on an understanding of the CISO's technical cybersecurity issues and how they fit into today's cybersecurity law challenges. The authors explain the difference and overlap between privacy law, cybersecurity law, and cybersecurity. Those interested in speaking the same cybersecurity language as a Chief Information Security Officer (CISO) will benefit. The first chapter provides a review of cybersecurity. For example, key to any discussion on cybersecurity is the Confidentiality, Integrity, and Availability (CIA) of data. Learn how to implement policy-based 'reasonable security measures' frameworks for your organization that form a legal defense to cybersecurity-based actions brought by U.S. agencies such as the Federal Trade Commission (FTC) and state Attorney Generals. A high-level discussion of the National Institute of Science and Technology (NIST) cybersecurity frameworks is included as well as data breach laws, anti-hacking related laws and some international issues"--Publisher's description. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Data protection |
| General subdivision | Law and legislation |
| Geographic subdivision | United States. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer security |
| General subdivision | Law and legislation |
| Geographic subdivision | United States. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer networks |
| General subdivision | Security measures |
| Geographic subdivision | United States. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Privacy, Right of |
| Geographic subdivision | United States. |
| 650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | R�eseaux d'ordinateurs |
| -- | (CaQQLa)201-0263812 |
| General subdivision | S�ecurit�e |
| -- | (CaQQLa)201-0263812 |
| General subdivision | Mesures |
| -- | (CaQQLa)201-0263812 |
| Geographic subdivision | �Etats-Unis. |
| -- | (CaQQLa)201-0407727 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer networks |
| General subdivision | Security measures. |
| Source of heading or term | fast |
| -- | (OCoLC)fst00872341 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Computer security |
| General subdivision | Law and legislation. |
| Source of heading or term | fast |
| -- | (OCoLC)fst00872492 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Data protection |
| General subdivision | Law and legislation. |
| Source of heading or term | fast |
| -- | (OCoLC)fst00887963 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Privacy, Right of. |
| Source of heading or term | fast |
| -- | (OCoLC)fst01077444 |
| 651 #7 - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME | |
| Geographic name | United States. |
| Source of heading or term | fast |
| -- | (OCoLC)fst01204155 |
| 655 #7 - INDEX TERM--GENRE/FORM | |
| Genre/form data or focus term | examination study guides. |
| Source of term | aat |
| -- | (CStmoGRI)aatgf300026368 |
| 655 #7 - INDEX TERM--GENRE/FORM | |
| Genre/form data or focus term | Hornbooks (Law) |
| Source of term | fast |
| -- | (OCoLC)fst01774270 |
| 655 #7 - INDEX TERM--GENRE/FORM | |
| Genre/form data or focus term | Study guides. |
| Source of term | fast |
| -- | (OCoLC)fst01423888 |
| 655 #7 - INDEX TERM--GENRE/FORM | |
| Genre/form data or focus term | Hornbooks (Law) |
| Source of term | lcgft |
| 655 #7 - INDEX TERM--GENRE/FORM | |
| Genre/form data or focus term | Study guides. |
| Source of term | lcgft |
| 655 #7 - INDEX TERM--GENRE/FORM | |
| Genre/form data or focus term | Manuels d'enseignement sup�erieur (Droit) |
| Source of term | rvmgf |
| -- | (CaQQLa)RVMGF-000001905 |
| 655 #7 - INDEX TERM--GENRE/FORM | |
| Genre/form data or focus term | Guides de l'�etudiant. |
| Source of term | rvmgf |
| -- | (CaQQLa)RVMGF-000001278 |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Hobaugh, Jack L., |
| Titles and other words associated with a name | Jr., |
| Relator term | author. |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
| Display text | Online version: |
| Main entry heading | Mireles, Michael Salomon. |
| Title | Principles of cybersecurity law. |
| Place, publisher, and date of publication | St. Paul, MN : West Academic Publishing, [2021] |
| International Standard Book Number | 9781636595474 |
| Record control number | (OCoLC)1261049990 |
| 830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
| Uniform title | Concise hornbook series. |
| 9 (RLIN) | 2474 |
| 938 ## - | |
| -- | Brodart |
| -- | BROD |
| -- | 130317624 |
| 938 ## - | |
| -- | YBP Library Services |
| -- | YANK |
| -- | 17545880 |
| 994 ## - | |
| -- | C0 |
| -- | TZACH |
No items available.
