Cyber Security
Autor Helen Wong Mbeen Limba Engleză Paperback – 27 sep 2018
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (1) | 956.02 lei 3-5 săpt. | |
| Bloomsbury Publishing – 27 sep 2018 | 956.02 lei 3-5 săpt. | |
| Hardback (1) | 1206.97 lei 11-18 zile | |
| BLOOMSBURY ACADEMIC – 20 mar 2025 | 1206.97 lei 11-18 zile |
Preț: 956.02 lei
Preț vechi: 1242.19 lei
-23%
Puncte Express: 1434
Preț estimativ în valută:
169.01€ • 200.90$ • 146.65£
169.01€ • 200.90$ • 146.65£
Carte disponibilă
Livrare economică 19 februarie-05 martie
Specificații
ISBN-13: 9781526505866
ISBN-10: 152650586X
Pagini: 792
Dimensiuni: 170 x 244 x 40 mm
Greutate: 1.23 kg
Editura: Bloomsbury Publishing
Locul publicării:London, United Kingdom
ISBN-10: 152650586X
Pagini: 792
Dimensiuni: 170 x 244 x 40 mm
Greutate: 1.23 kg
Editura: Bloomsbury Publishing
Locul publicării:London, United Kingdom
Caracteristici
A first port of call for legal practitioners including solicitors, barristers, in-house counsel, data protection compliance officers as well as company directors, finance directors and HR directors/professionals who find themselves faced with cyber security and data protection/management issues.
Notă biografică
General EditorHelen Wong, MBE is a corporate commercial lawyer with Clarke Willmott Solicitors and works with their IP team who are specialists in cyber security and IP law. Previously Helen was with Clifford Chance (London and Hong Kong), PricewaterhouseCoopers and Walkers in the Cayman Islands. Helen frequently speaks and writes about topical legal issues including Brexit, cybersecurity and China. She is also the author of the book, Doing Business After Brexit: A Practical Guide to the Legal Changes (Bloomsbury Professional, August 2017). She is also a recipient of Her Majesty's Member of the British Empire (MBE).
Cuprins
Chapter 1. Threats - Melanie Oldham and Abigail McAlpine (with "Script Kiddies" by Gary Broadfield)Chapter 2. Vulnerabilities - Melanie Oldham and Abigail McAlpineChapter 3. The Law - Ria Halme (with "Territorial Scope" by Gary Broadfield)Chapter 4. How to Defend - Graeme BatsmanChapter 5. Privacy and Security in The Workplace - Ria HalmeChapter 6. Security in The Built Environment - Nathan JonesChapter 7. The Importance of Policy and Guidance in Digital Communications - Ben SilverstoneChapter 8. The C Suite Perspective on Cyber Risk - Klaus JulischChapter 9. Corporate Governance Mind Map - Andrew ConstantineChapter 10. Industry Specialists In-Depth Reports- Mobile Payments - Rhiannon Lewis- Electric Utilities: Critical Infrastructure Protection and Reliability - E. Rudina and S. Kort- Manufactuting - Filippo Mauri- Think Money Group and UK Financial Services - Steven Peacock- Towards Ennergy 4.0 - Stefano Bracco- Aerospace, Defence and Security Sector - Simon Goldsmith- Banking - in the Emirates - Yazid Khandhadia- Healthcare - Helen Wong MBE- Medical Devices - Helen Wong MBEChapter 11. Social Media and Cyber Security - Susan HallChapter 12. International Law and Interaction Between States - Dr Benjamin AngChapter 13. Security Concerns with The Internet of Things - Kevin CurranChapter 14. Managing Cyber-Security in An International Financial Institution - Cosimo PaccianiChapter 15. Employee Liability and Protection - Sally PenniChapter 16. Data Security - The New Oil - Ryan MackieChapter 17. Data Classification - Reza AlviChapter 18. Liability Following A Data Breach - Mark DeemChapter 19. Criminal Law - Jill Lorimer and William ChristopherChapter 20. The Digital Next Way - Mark BlackhurstChapter 21. Intelligence and The Monitoring of Everyday Life - Dr Victoria Wang and Professor John V. TuckerChapter 22. Collaboration: Results? - David ClarkeChapter 23. Cybersecurity: The Cause and The Cure - Kevin MurphyChapter 24. Mergers and Acquisitions Corporate Due Diligence and Cyber Security Issues - Vijay RathourChapter 25. Protecting Organisations - Gary HibberdChapter 26. Public Private Partnerships - E. RudinaChapter 27. Behavioural Science in Cyber Security - Leron ZinatullinChapter 28. Agile Cyber Security Process Capability - Lanre RotimiChapter 29. Cyber Secret, Life Secrets - On the Verge of Human Science - Arthue KeletiChapter 30. A Plan for the SME - William McBorroughChapter 31. Conclusion - Helen Wong MBEAppendix 1 Theresa May Speech, Munich Security Conference, February 2018Appendix 2 Cyber-Security Lexicon for Converged SystemsAppendix 3 The Government's National ResponseAppendix 4 Sample Legal Documents
Recenzii
...offers unparalleled insight into the development of cyber security and countermeasures against cyber attacks...as useful for legal practitioners as it will be for DPOs and cyber security practitioners as they seek to understand the latest developments in cyber security and data protection in the European Union and the United Kingdom, and look to create robust security frameworks that will be so essential if they are to stay competitive and influential in a constantly changing technology landscape
Descriere
Descriere de la o altă ediție sau format:
With cyber security law being increasingly contentious, organisations require expert assistance to operationalise matters and uphold a necessarily robust security framework.
Invaluable for legal practitioners and organisations, this comprehensive text covers both the law and its practical application, helping to ensure that advisers and organisations have effective policies and procedures in place to deal with cyber security. Topics covered range from privacy and security in the workplace and built environment, to social media and cyber security, and international law and interaction between states.
Revised and updated, the Second Edition also benefits readers with coverage of new topics including:
- The legal risks of generative AI
- Cyber security disputes
- Data architecture
- Social media and cyber security
- Non-fungible tokens ('NFTs') as legal property
- Cyber security checklist and triage
In addition to contributions from leading international experts, the book also features in-depth reports from industry specialists. Additional context is provided through insights into how the law is developed outside the regulatory frameworks, case law and the role of professional and industry standards for security.
This title is included in Bloomsbury Professional's Cyber Law online service.
With cyber security law being increasingly contentious, organisations require expert assistance to operationalise matters and uphold a necessarily robust security framework.
Invaluable for legal practitioners and organisations, this comprehensive text covers both the law and its practical application, helping to ensure that advisers and organisations have effective policies and procedures in place to deal with cyber security. Topics covered range from privacy and security in the workplace and built environment, to social media and cyber security, and international law and interaction between states.
Revised and updated, the Second Edition also benefits readers with coverage of new topics including:
- The legal risks of generative AI
- Cyber security disputes
- Data architecture
- Social media and cyber security
- Non-fungible tokens ('NFTs') as legal property
- Cyber security checklist and triage
In addition to contributions from leading international experts, the book also features in-depth reports from industry specialists. Additional context is provided through insights into how the law is developed outside the regulatory frameworks, case law and the role of professional and industry standards for security.
This title is included in Bloomsbury Professional's Cyber Law online service.