by
Sutton, David (Information security practitioner), author.
Format:
Books
Publication Date
2017
Excerpt:
; Appendix C: Cyber Security Law ; Appendix D: Cyber Security Training ; Appendix E: Links to Other Useful
by
Pfleeger, Charles P., 1948- author.
Format:
Regular print
Publication Date
2015
Excerpt:
, devices, operating systems, networks, law, and ethics. Reflecting rapidly evolving attacks
by
Wiles, Jack.
Format:
Books
Publication Date
2012
Excerpt:
tester -- Low tech hacking and the law: where can you go for help? -- Information security awareness
by
Whitman, Michael E., 1964-
Format:
Books
Publication Date
2008
Excerpt:
. Risk management -- ch. 9. Protection mechanisms -- ch. 10. Personnel and security -- ch. 11. Law and
by
Carroll, John Millar.
Format:
Books
Publication Date
1996
Excerpt:
, Computer Security, Third Edition includes new information on: computer crime and the law; physical security
by
Garfinkel, Simson.
Table of contents http://www.gbv.de/dms/bowker/toc/9781565921481.pdf
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html
Umschlagbild http://swbplus.bsz-bw.de/bsz048310409cov.htm
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0915/96161185-d.html
Umschlagbild http://swbplus.bsz-bw.de/bsz048310409cov.htm
Format:
Books
Publication Date
1996
Excerpt:
and solutions -- 26. Computer security and U.S. law -- 27. Who do you trust? -- VII. Appendixes -- A