did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781435441576

Readings & Cases in Information Security Law & Ethics

by ;
  • ISBN13:

    9781435441576

  • ISBN10:

    1435441575

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2010-06-23
  • Publisher: Course Technology

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $67.00 Save up to $30.82
  • Rent Book $36.18
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 24-48 HOURS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

READINGS AND CASES IN INFORMATION SECURITY: LAW & ETHICS can be used to support several courses in the Information Security curriculum, including Incident Response, Disaster Recovery, Risk Management, Principles of Information Security, Ethics in Security, and Management of Information Security. The chapters are interspersed with both a variety of case problems designed to stimulate in class and written discussions.

Table of Contents

Preface & Introduction
Running Case: Introduction and Background
Personnel & Privacy
Reading: Data Privacy: Is it Possible
Case: Technology Department and a Human Resources Department: A Case Study and Analysis
Case: IT Ethics and Security in an IT Certification Project
Reading
An Etymological View of Ethical Hacking
Running Case
Risk Management
Reading
CYBER Insurance and Residual Information Risk Management
Paper: Rethinking Risk-based Security
Case: Video Maze
Running Case
Management of Security Technology
Reading: Cryptography Algorithms Standards: A Guideline for Management
Reading: Cyber Terrorism: Impacts, Vulnerabilities, and U.S. Policy
Case: Advanced Topologies, Inc
Reading: Web Applications: Vulnerabilities and Remediation
Reading: Managing Secure Database Systems
Running Case
Information Security Program Management
Case: Legal and Ethical Issues in Information Security Metrics
Reading: Impact of Incomplete or Missing Information in a Security Policy
Case: Using Laws for Federal Agencies to Investigate Legal and Ethical Management of Information Security
Case: The Law in Information Security Management
Running Case
Regulatory Compliance Management
Reading: Security Compliance Auditing: Review and Research Directions
Reading: Global Information Security Regulations, Case Studies and Cultural Issues
Case: Collaboration and Compliance in Healthcare: A Threat Modeling Case Study
Running Case
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program