Cybersecurity law [3rd ed.] (Record no. 567647)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01628 a2200205 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250922103714.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250917b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781119822165 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 343.7309 |
Item number | K847c3 |
100 ## - MAIN ENTRY--AUTHOR NAME | |
Personal name | Kosseff, Jeff |
245 ## - TITLE STATEMENT | |
Title | Cybersecurity law [3rd ed.] |
Statement of responsibility, etc | Jeff Kosseff |
250 ## - EDITION STATEMENT | |
Edition statement | 3rd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Name of publisher | John Wiley |
Year of publication | 2023 |
Place of publication | Hoboken |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | xxxv, 836p |
500 ## - GENERAL NOTE | |
General note | with website. |
520 ## - SUMMARY, ETC. | |
Summary, etc | Cybersecurity is an essential facet of modern society, and as a result, the application of security measures that ensure the confidentiality, integrity, and availability of data is crucial. Cybersecurity can be used to protect assets of all kinds, including data, desktops, servers, buildings, and most importantly, humans. Understanding the ins and outs of the legal rules governing this important field is vital for any lawyer or other professionals looking to protect these interests.<br/>The thoroughly revised and updated Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity, reflecting the latest legal developments on the subject. This comprehensive text deals with all aspects of cybersecurity law, from data security and enforcement actions to anti-hacking laws, from surveillance and privacy laws to national and international cybersecurity law. New material in this latest edition includes many expanded sections, such as the addition of more recent FTC data security consent decrees, including Zoom, SkyMed, and InfoTrax. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer security |
-- | Law and legislation |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
Withdrawn status | Lost status | Damaged status | Not for loan | Collection code | Home library | Current library | Date acquired | Source of acquisition | Cost, normal purchase price | Full call number | Accession Number | Cost, replacement price | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Under Process | General Stacks | PK Kelkar Library, IIT Kanpur | PK Kelkar Library, IIT Kanpur | 15/09/2025 | 2 | 7797.08 | 343.7309 K847c3 | A187039 | 10396.11 | Books |