MARC

LEADER 00000cam a2200000 a 4500
001 lb492676
003 CoU-L
005 20220526045640.0
008 110113t20112011ilua b 001 0 eng
010 |a  2011001891 
020 |a 9781604429893 
020 |a 1604429895 
035 |a (OCoLC)696943335 
035 |a .b4926766  |b lst2   |c - 
040 |a DLC  |c DLC  |d VRL  |d GZL  |d UtOrBLW 
043 |a n-us--- 
049 |a UCXA 
082 0 0 |a 342.7308/58  |2 22 
090 |a KF1263.C65  |b D383 2011 
245 0 0 |a Data breach and encryption handbook /  |c Lucy Thomson, editor. 
264 1 |a Chicago, Ill. :  |b American Bar Association, Section of Science & Technology Law,  |c [2011] 
264 4 |c ©2011. 
300 |a xxv, 328 pages :  |b illustrations ;  |c 26 cm. 
336 |a text  |b txt  |2 rdacontent. 
337 |a unmediated  |b n  |2 rdamedia. 
338 |a volume  |b nc  |2 rdacarrier. 
504 |a Includes bibliographic references (pages 309-316) and indexes. 
505 0 0 |g PART I :  |t CRISIS IN INFORMATION SECURITY:  |t Cybercrime and escalating risks --  |t Despite the alarming trends, data breaches are preventable --  |t The aftermath of data breaches : potential liability and damages --  |t The underground world of online identity theft : an overview --  |g PART II :  |t ANATOMY OF THE MAJOR DATA BREACHES:  |t Encrypted records : failed security --  |g PART III :  |t LAW:  |t Ambiguities in state security breach notification statutes --  |t State data breach notification laws and the duty to provide information security --  |t HITECH : the first federal data breach notification law --  |t Breach notification and encryption : a global perspective --  |g PART IV :  |t TECHNOLOGY:  |t Encryption : the basics --  |t Encryption best practices --  |t Circumventing data encryption : password vulnerabilities --  |t Managing cryptographic keys --  |t The self-encrypting drive --  |t Encryption technologies : a practical assessment --  |g PART V :  |t RESPONSE:  |t Security best practices : the watchword is prioritize! --  |t Responding to data breaches --  |t Technology to prevent data leaks --  |t Insurance protection for security breaches --  |g Appendices. 
650 0 |a Data protection  |x Law and legislation  |z United States. 
650 0 |a Computer networks  |x Law and legislation  |z United States  |x Criminal provisions. 
650 0 |a Privacy, Right of  |z United States. 
650 0 |a Records  |x Access control  |z United States. 
650 0 |a Computer security  |x Law and legislation  |z United States. 
650 0 |a Data encryption (Computer science)  |x Law and legislation  |z United States. 
650 0 |a Computer crimes  |z United States. 
650 0 |a Identity theft  |z United States. 
650 0 |a Computer security  |x Standards. 
700 1 |a Thomson, Lucy L. 
710 2 |a American Bar Association.  |b Section of Science & Technology Law. 
902 |a 220707 
999 |b 1  |c 110308  |d m  |e a  |f -  |g 0 
994 |a lst2 
945 |l lst2  
999 f f |i 7883fa67-ddea-548f-a4b5-b69cd72b57c6  |s 957041b9-9e08-51cd-8fe7-ebd608dcc325 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Law Campus  |c Law  |d Law Library - Stacks 2nd floor  |e KF1263.C65 D383 2011  |h Library of Congress classification  |i book  |m U182004528238  |n 1