This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace. The book will advance understanding of the ethical and legal aspects of cyberspace followed by the risks involved along with current and proposed cyber policies.
This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace. The book will advance understanding of the ethical and legal aspects of cyberspace followed by the risks involved along with current and proposed cyber policies.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Ishaani Priyadarshini, PhD, has authored book chapters and journal articles for SCIE-indexed journals. As a certified reviewer, she conducts peer review of research papers for IEEE, Elsevier, and Springer journals and is a member of the editorial board of the International Journal of Information Security and Privacy. She is a PhD candidate (Department of Electrical and Computer Engineering) at the University of Delaware, USA. Her areas of research include cybersecurity (authentication systems, cybersecurity ethics, and policies) and artificial intelligence. Chase Cotton, PhD, CISSP, is Professor of Practice and Director of the University of Delaware Center for Intelligent CyberSecurity, USA. He is a successful researcher, telecommunications carrier executive, product manager, consultant, and educator for the technologies used in Internet and data services in the carrier environment. Dr. Cotton's varied background includes communications research at Bellcore's Applied Research Area, creating new algorithms and methods in bridging multicast and many forms of packet-based applications, including voice and video, traffic monitoring, transport protocols, custom VLSI for communications (protocol engines and content addressable memories), and gigabit networking. Past work also included assisting carriers worldwide as they started their Internet businesses, including Internet Service Providers (ISPs), hosting and web services, and the first large-scale commercial deployment of Digital Subscriber Line (DSL) for consumer broadband services. In 2000, Dr. Cotton assumed research, planning, and engineering for Sprint's global Tier 1 Internet provider, SprintLink. His research interests include cybersecurity and high-availability software systems with funding drawn from the NSF, ARL, CERDEC, JPMorgan Chase, and other industrial sponsors. Dr. Cotton currently consults on communications and Internet architectures for many carriers and equipment vendors worldwide.
Inhaltsangabe
Part 1: Cybersecurity: Ethics and Legal 1. Introduction to Cyberethics 2. Ethical Issues in Cybersecurity 3. Cybersecurity Ethics: Cyberspace and Other Applications 4. Introduction to Cyber laws 5. Cyber laws in the United States Part 2: Cybersecurity: Risks and Policies 6. Risks in Cybersecurity 7. Cyber Risks and Cyber Insurance 8. Introduction to Cybersecurity Policies
Part 1: Cybersecurity: Ethics and Legal 1. Introduction to Cyberethics 2. Ethical Issues in Cybersecurity 3. Cybersecurity Ethics: Cyberspace and Other Applications 4. Introduction to Cyber laws 5. Cyber laws in the United States Part 2: Cybersecurity: Risks and Policies6. Risks in Cybersecurity 7. Cyber Risks and Cyber Insurance 8. Introduction to Cybersecurity Policies
Part 1: Cybersecurity: Ethics and Legal 1. Introduction to Cyberethics 2. Ethical Issues in Cybersecurity 3. Cybersecurity Ethics: Cyberspace and Other Applications 4. Introduction to Cyber laws 5. Cyber laws in the United States Part 2: Cybersecurity: Risks and Policies 6. Risks in Cybersecurity 7. Cyber Risks and Cyber Insurance 8. Introduction to Cybersecurity Policies
Part 1: Cybersecurity: Ethics and Legal 1. Introduction to Cyberethics 2. Ethical Issues in Cybersecurity 3. Cybersecurity Ethics: Cyberspace and Other Applications 4. Introduction to Cyber laws 5. Cyber laws in the United States Part 2: Cybersecurity: Risks and Policies6. Risks in Cybersecurity 7. Cyber Risks and Cyber Insurance 8. Introduction to Cybersecurity Policies
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497