Readings and Cases in Information Security : Law and Ethics (1ST)

Readings and Cases in Information Security : Law and Ethics (1ST)

  • ただいまウェブストアではご注文を受け付けておりません。 ⇒古書を探す
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 364 p.
  • 言語 ENG
  • 商品コード 9781435441576
  • DDC分類 174.93843

Full Description


READINGS AND CASES IN INFORMATION SECURITYdepth of content and analytical viewpoint not found in many other books. Designed for use with any Cengage Learning security text or as a standalone professional reference, this book offers readers a real-life view of information security management, including the ethical and legal issues associated with various on-the-job experiences. Included are a wide selection of foundational readings and scenarios from a variety of experts to give the reader the most realistic perspective of a career in information security.

Contents

Part IPart II: RUNNING CASE: INTRODUCTION AND BACKGROUND.Part III: PERSONNEL & PRIVACY.Reading: Data Privacy: Is it Possible? John H. Nugent, Texas Women's University, Case: Technology Department and a Human Resources Department: A Case Study and Analysis. Jeffrey M. Stanton. Syracuse University. Case: IT Ethics and Security in an IT Certification Project. Jeffrey P. Landry, University of South Alabama. J. Harold Pardue, University of South Alabama. Reading: An Etymological View of Ethical Hacking. Michael Whitman, Kennesaw State University. Running Case.Part IV: RISK MANAGEMENT.Reading: CYBER Insurance and Residual Information Risk Management Tridib Bandyopadhyay, Kennesaw State University. Paper: Rethinking Risk-based Security. Herbert Mattord, Kennesaw State University. Case: Video Maze. Patricia Morrison, Cape Breton University. Running Case.Reading: Cryptography Algorithms Standards: A Guideline for Management. Wasim A Al-Hamdani, Kentucky State University. Reading: Cyber Terrorism: Impacts, Vulnerabilities, and U.S. Policy Tridib Bandyopadhyay, Kennesaw State University. Case: Advanced Topologies, Inc. Reading: Web Applications: Vulnerabilities and Remediation Shankar Babu Chebrolu, Cisco Systems Vinay K. Bansal, Cisco Systems. Reading: Managing Secure Database Systems Li Yang, University of Tennessee at Chattanooga.Running Case.Part VI: INFORMATION SECURITY PROGRAM MANAGEMENT.Case: Legal and Ethical Issues in Information Security MetricsJennifer L. Bayuk, Stevens Institute of Technology, School of Systems and Enterprises. Reading: Impact of Incomplete or Missing Information in a Security Policy Wasim A Al-Hamdani, Kentucky State UniversityWendy Dixie, Kentucky State University. Case: Using Laws for Federal Agencies to Investigate Legal and Ethical Management of Information Security Jeffrey P. Landry, University of South Alabama. Case: The Law in Information Security Management Katherine H. Winters, University of Tennessee at Chattanooga. Running Case.Part VII: REGULATORY COMPLIANCE MANAGEMENT.Reading: Security Compliance Auditing: Review and Research DirectionsGuillermo A. Francia, III, Jacksonville State University Jeffrey S. Zanzig, Jacksonville State University. Reading: Global Information Security Regulations, Case Studies and Cultural Issues Guillermo A. Francia, III, Jacksonville State UniversityAndrew P. Ciganek, Jacksonville State University. Case: Collaboration and Compliance in Healthcare: A Threat Modeling Case Study.Divakaran Liginlal, University of South Alabama, Lara Z. Khansa, Virginia Polytechnic Institute & State University, Jeffrey P. Landry, University of South Alabama. Running Case.

最近チェックした商品