|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
lb492676 |
003 |
CoU-L |
005 |
20220526045640.0 |
008 |
110113t20112011ilua b 001 0 eng |
010 |
|
|
|a 2011001891
|
020 |
|
|
|a 9781604429893
|
020 |
|
|
|a 1604429895
|
035 |
|
|
|a (OCoLC)696943335
|
035 |
|
|
|a .b4926766
|b lst2
|c -
|
040 |
|
|
|a DLC
|c DLC
|d VRL
|d GZL
|d UtOrBLW
|
043 |
|
|
|a n-us---
|
049 |
|
|
|a UCXA
|
082 |
0 |
0 |
|a 342.7308/58
|2 22
|
090 |
|
|
|a KF1263.C65
|b D383 2011
|
245 |
0 |
0 |
|a Data breach and encryption handbook /
|c Lucy Thomson, editor.
|
264 |
|
1 |
|a Chicago, Ill. :
|b American Bar Association, Section of Science & Technology Law,
|c [2011]
|
264 |
|
4 |
|c ©2011.
|
300 |
|
|
|a xxv, 328 pages :
|b illustrations ;
|c 26 cm.
|
336 |
|
|
|a text
|b txt
|2 rdacontent.
|
337 |
|
|
|a unmediated
|b n
|2 rdamedia.
|
338 |
|
|
|a volume
|b nc
|2 rdacarrier.
|
504 |
|
|
|a Includes bibliographic references (pages 309-316) and indexes.
|
505 |
0 |
0 |
|g PART I :
|t CRISIS IN INFORMATION SECURITY:
|t Cybercrime and escalating risks --
|t Despite the alarming trends, data breaches are preventable --
|t The aftermath of data breaches : potential liability and damages --
|t The underground world of online identity theft : an overview --
|g PART II :
|t ANATOMY OF THE MAJOR DATA BREACHES:
|t Encrypted records : failed security --
|g PART III :
|t LAW:
|t Ambiguities in state security breach notification statutes --
|t State data breach notification laws and the duty to provide information security --
|t HITECH : the first federal data breach notification law --
|t Breach notification and encryption : a global perspective --
|g PART IV :
|t TECHNOLOGY:
|t Encryption : the basics --
|t Encryption best practices --
|t Circumventing data encryption : password vulnerabilities --
|t Managing cryptographic keys --
|t The self-encrypting drive --
|t Encryption technologies : a practical assessment --
|g PART V :
|t RESPONSE:
|t Security best practices : the watchword is prioritize! --
|t Responding to data breaches --
|t Technology to prevent data leaks --
|t Insurance protection for security breaches --
|g Appendices.
|
650 |
|
0 |
|a Data protection
|x Law and legislation
|z United States.
|
650 |
|
0 |
|a Computer networks
|x Law and legislation
|z United States
|x Criminal provisions.
|
650 |
|
0 |
|a Privacy, Right of
|z United States.
|
650 |
|
0 |
|a Records
|x Access control
|z United States.
|
650 |
|
0 |
|a Computer security
|x Law and legislation
|z United States.
|
650 |
|
0 |
|a Data encryption (Computer science)
|x Law and legislation
|z United States.
|
650 |
|
0 |
|a Computer crimes
|z United States.
|
650 |
|
0 |
|a Identity theft
|z United States.
|
650 |
|
0 |
|a Computer security
|x Standards.
|
700 |
1 |
|
|a Thomson, Lucy L.
|
710 |
2 |
|
|a American Bar Association.
|b Section of Science & Technology Law.
|
902 |
|
|
|a 220707
|
999 |
|
|
|b 1
|c 110308
|d m
|e a
|f -
|g 0
|
994 |
|
|
|a lst2
|
945 |
|
|
|l lst2
|
999 |
f |
f |
|i 7883fa67-ddea-548f-a4b5-b69cd72b57c6
|s 957041b9-9e08-51cd-8fe7-ebd608dcc325
|
952 |
f |
f |
|p Can circulate
|a University of Colorado Boulder
|b Law Campus
|c Law
|d Law Library - Stacks 2nd floor
|e KF1263.C65 D383 2011
|h Library of Congress classification
|i book
|m U182004528238
|n 1
|