Skip to:Content
|
Bottom
Cover image for Principles and practice of information security : protecting computers from hackers and lawyers
Title:
Principles and practice of information security : protecting computers from hackers and lawyers
Personal Author:
Publication Information:
Upper Saddle River, N.J. : Pearson/Prentice Hall, 2004
ISBN:
9780131840270

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010059312 TK5105.59 V64 2004 Open Access Book Book
Searching...
Searching...
30000010059052 TK5105.59 V64 2004 Open Access Book Book
Searching...

On Order

Summary

Summary

This book provides professionals with the necessary managerial, technical, and legal background to support investment decisions in security technology. It discusses security from the perspective of hackers (i.e., technology issues and defenses) and lawyers (i.e., legal issues and defenses). This cross-disciplinary book is designed to help users quickly become current on what has become a fundamental business issue. This book covers the entire range of best security practices--obtaining senior management commitment, defining information security goals and policies, transforming those goals into a strategy for monitoring intrusions and compliance, and understanding legal implications. Topics also include computer crime, electronic evidence, cyber terrorism, and computer forensics. For professionals in information systems, financial accounting, human resources, health care, legal policy, and law. Because neither technical nor legal expertise is necessary to understand the concepts and issues presented, this book can be required reading for everyone as part of an enterprise-wide computer security awareness program.


Table of Contents

I Digital Liabilities And Risk Management
1 Security in a Globally Connected Economy
2 Sources of Digital Liability
3 Threats, Vulnerabilities, and Risk Exposure
4 An Affirmative Model of Defense: Digital Liability Management
5 Models for Estimating Risk and Optimizing the Return on Security Investment
II Policies, Practices, And Defensive Technology
6 Acceptable Use Policies: Human Defenses
7 Secure Use Practices: Defensive Best Practices
8 Technology and Auditing Systems: Hardware and Software Defenses
III Computer Forensics, Electronic Evidence, Fraud, And Computer Crime Laws
9 Electronic Evidence, Electronic Records Management, and Computer Forensics
10 Computer Crime, Computer Fraud, and Cyber Terrorism
Appendix: USA PATRIOT Act
IV Privacy
11 Privacy and Data Protection
Appendix: HIPAA
Glossary of Technology and Legal Terms
Abbreviations and Acronyms
References
Online References
Subject Index
Go to:Top of Page