Cyber Security: Law and Guidance (2ND)

個数:

Cyber Security: Law and Guidance (2ND)

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 896 p.
  • 言語 ENG
  • 商品コード 9781526528100
  • DDC分類 343.09995

Full Description

With cyber security law being increasingly contentious, organisations require expert assistance to operationalise matters and uphold a necessarily robust security framework.

Invaluable for legal practitioners and organisations, this comprehensive text covers both the law and its practical application, helping to ensure that advisers and organisations have effective policies and procedures in place to deal with cyber security. Topics covered range from privacy and security in the workplace and built environment, to social media and cyber security, and international law and interaction between states.

Revised and updated, the Second Edition also benefits readers with coverage of new topics including:

- The legal risks of generative AI
- Cyber security disputes
- Data architecture
- Social media and cyber security
- Non-fungible tokens ('NFTs') as legal property
- Cyber security checklist and triage

In addition to contributions from leading international experts, the book also features in-depth reports from industry specialists. Additional context is provided through insights into how the law is developed outside the regulatory frameworks, case law and the role of professional and industry standards for security.

This title is included in Bloomsbury Professional's Cyber Law online service.

Contents

1. Threats
2. Vulnerabilities
3. The Law
4. Defend
4A. The Risk Practitioner's Journey: Risk Aligned Assurance and the Three Lines of Defense
4B. NCSC Research Problem Book - How to Defend
5. Privacy and Security in the Workplace
6. Cyber Security and Physical Buildings
7. Cyber Breach Playbook and Flow Chart
8. The C Suite Perspective on Cyber Risk
9. Cyber Security Checklist and Triage
9A. Checklist for Addressing and Preparing for Cybersecurity Incidents
9B. Cyber Incident Checklist
9C. Security Incident Notification Requirements (UK)
10. Industry Specialists In-Depth Reports
10A. Mobile Payments
10B. Electric Utilities: Critical Infrastructure Protection and Reliability Standards
10C. Securing Critical Manufacturing Sectors from Modern Cyber Threats
10D. UK Financial Services
10E. Cybersecurity for the Energy Sector: Toward Energy 4.0
10F. Aerospace, Defence and Security Sector
10G. Banking in the Emirates - The NBD Way
10H. Healthcare
10I. Medical Devices
11. Social Media and Cyber Security
12. International Law and Interaction between States
13. Security Concerns with The Internet of Things
14. Managing Cyber-Security in an International Financial Institution
15. Employee Liability and Protection
16. Data Security - The New Oil
17. Data Classification
18. Liability Following a Data Breach
19. Criminal Law
20. The Digital Next Way
21A. Product Security and Telecommunications Infrastructure Act 2022
21B. Intelligence and the Monitoring of Everyday Life
22. Cyber Security Law and Legislation: Protecting Data in the UK, EU, and USA: Breachless Liability
23. Data Architecture: Cybersecurity's Silent Partner
24. Mergers and Acquisitions Corporate Due Diligence and Cyber Security Issues
25. Protecting Organisations
26. Public Private Partnerships
27. Cyber Security Disputes
28. The Jello Problem: Key Features of Generative AI That Create Legal Risk
29. Cyber Secret, Life Secrets - On the Verge of Human Science
30. A Plan for the SME
31. Conclusion
Appendices

最近チェックした商品