A termék adatai:
ISBN13: | 9781526528100 |
ISBN10: | 152652810X |
Kötéstípus: | Keménykötés |
Terjedelem: | oldal |
Méret: | 248x156 mm |
Súly: | 600 g |
Nyelv: | angol |
700 |
Témakör:
Cyber Security: Law and Guidance
Kiadás sorszáma: 2
Kiadó: Bloomsbury Professional
Megjelenés dátuma: 2024. november 28.
Kötetek száma: Hardback
Normál ár:
Kiadói listaár:
GBP 180.00
GBP 180.00
Az Ön ára:
80 077 (76 264 Ft + 5% áfa )
Kedvezmény(ek): 13% (kb. 11 966 Ft)
A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
Kattintson ide a feliratkozáshoz
Kattintson ide a feliratkozáshoz
Beszerezhetőség:
Még nem jelent meg, de rendelhető. A megjelenéstől számított néhány héten belül megérkezik.
Hosszú leírás:
With cyber security law being increasingly contentious, organisations require expert assistance to operationalise matters and uphold a necessarily robust security framework.
Invaluable for legal practitioners and organisations, this comprehensive text covers both the law and its practical application, helping to ensure that advisers and organisations have effective policies and procedures in place to deal with cyber security. Topics covered range from privacy and security in the workplace and built environment, to social media and cyber security, and international law and interaction between states.
Revised and updated, the Second Edition also benefits readers with coverage of new topics including:
- The legal risks of generative AI
- Cyber security disputes
- Data architecture
- Social media and cyber security
- Non-fungible tokens ('NFTs') as legal property
- Cyber security checklist and triage
In addition to contributions from leading international experts, the book also features in-depth reports from industry specialists. Additional context is provided through insights into how the law is developed outside the regulatory frameworks, case law and the role of professional and industry standards for security.
This title is included in Bloomsbury Professional's Cyber Law online service.
Invaluable for legal practitioners and organisations, this comprehensive text covers both the law and its practical application, helping to ensure that advisers and organisations have effective policies and procedures in place to deal with cyber security. Topics covered range from privacy and security in the workplace and built environment, to social media and cyber security, and international law and interaction between states.
Revised and updated, the Second Edition also benefits readers with coverage of new topics including:
- The legal risks of generative AI
- Cyber security disputes
- Data architecture
- Social media and cyber security
- Non-fungible tokens ('NFTs') as legal property
- Cyber security checklist and triage
In addition to contributions from leading international experts, the book also features in-depth reports from industry specialists. Additional context is provided through insights into how the law is developed outside the regulatory frameworks, case law and the role of professional and industry standards for security.
This title is included in Bloomsbury Professional's Cyber Law online service.
Tartalomjegyzék:
1. Threats
2. Vulnerabilities
3. The Law
4. Defend
4A. The Risk Practitioner's Journey: Risk Aligned Assurance and the Three Lines of Defense
4B. NCSC Research Problem Book - How to Defend
5. Privacy and Security in the Workplace
6. Cyber Security and Physical Buildings
7. Cyber Breach Playbook and Flow Chart
8. The C Suite Perspective on Cyber Risk
9. Cyber Security Checklist and Triage
9A. Checklist for Addressing and Preparing for Cybersecurity Incidents
9B. Cyber Incident Checklist
9C. Security Incident Notification Requirements (UK)
10. Industry Specialists In-Depth Reports
10A. Mobile Payments
10B. Electric Utilities: Critical Infrastructure Protection and Reliability Standards
10C. Securing Critical Manufacturing Sectors from Modern Cyber Threats
10D. UK Financial Services
10E. Cybersecurity for the Energy Sector: Toward Energy 4.0
10F. Aerospace, Defence and Security Sector
10G. Banking in the Emirates - The NBD Way
10H. Healthcare
10I. Medical Devices
11. Social Media and Cyber Security
12. International Law and Interaction between States
13. Security Concerns with The Internet of Things
14. Managing Cyber-Security in an International Financial Institution
15. Employee Liability and Protection
16. Data Security - The New Oil
17. Data Classification
18. Liability Following a Data Breach
19. Criminal Law
20. The Digital Next Way
21A. Product Security and Telecommunications Infrastructure Act 2022
21B. Intelligence and the Monitoring of Everyday Life
22. Cyber Security Law and Legislation: Protecting Data in the UK, EU, and USA: Breachless Liability
23. Data Architecture: Cybersecurity's Silent Partner
24. Mergers and Acquisitions Corporate Due Diligence and Cyber Security Issues
25. Protecting Organisations
26. Public Private Partnerships
27. Cyber Security Disputes
28. The Jello Problem: Key Features of Generative AI That Create Legal Risk
29. Cyber Secret, Life Secrets - On the Verge of Human Science
30. A Plan for the SME
31. Conclusion
Appendices
2. Vulnerabilities
3. The Law
4. Defend
4A. The Risk Practitioner's Journey: Risk Aligned Assurance and the Three Lines of Defense
4B. NCSC Research Problem Book - How to Defend
5. Privacy and Security in the Workplace
6. Cyber Security and Physical Buildings
7. Cyber Breach Playbook and Flow Chart
8. The C Suite Perspective on Cyber Risk
9. Cyber Security Checklist and Triage
9A. Checklist for Addressing and Preparing for Cybersecurity Incidents
9B. Cyber Incident Checklist
9C. Security Incident Notification Requirements (UK)
10. Industry Specialists In-Depth Reports
10A. Mobile Payments
10B. Electric Utilities: Critical Infrastructure Protection and Reliability Standards
10C. Securing Critical Manufacturing Sectors from Modern Cyber Threats
10D. UK Financial Services
10E. Cybersecurity for the Energy Sector: Toward Energy 4.0
10F. Aerospace, Defence and Security Sector
10G. Banking in the Emirates - The NBD Way
10H. Healthcare
10I. Medical Devices
11. Social Media and Cyber Security
12. International Law and Interaction between States
13. Security Concerns with The Internet of Things
14. Managing Cyber-Security in an International Financial Institution
15. Employee Liability and Protection
16. Data Security - The New Oil
17. Data Classification
18. Liability Following a Data Breach
19. Criminal Law
20. The Digital Next Way
21A. Product Security and Telecommunications Infrastructure Act 2022
21B. Intelligence and the Monitoring of Everyday Life
22. Cyber Security Law and Legislation: Protecting Data in the UK, EU, and USA: Breachless Liability
23. Data Architecture: Cybersecurity's Silent Partner
24. Mergers and Acquisitions Corporate Due Diligence and Cyber Security Issues
25. Protecting Organisations
26. Public Private Partnerships
27. Cyber Security Disputes
28. The Jello Problem: Key Features of Generative AI That Create Legal Risk
29. Cyber Secret, Life Secrets - On the Verge of Human Science
30. A Plan for the SME
31. Conclusion
Appendices