Jeżeli nie znalazłeś poszukiwanej książki, skontaktuj się z nami wypełniając formularz kontaktowy.

Ta strona używa plików cookies, by ułatwić korzystanie z serwisu. Mogą Państwo określić warunki przechowywania lub dostępu do plików cookies w swojej przeglądarce zgodnie z polityką prywatności.

Wydawcy

Literatura do programów

Informacje szczegółowe o książce

Global Perspectives In Information Security: Legal, Social, and International Issues - ISBN 9780470372111

Global Perspectives In Information Security: Legal, Social, and International Issues

ISBN 9780470372111

Autor: Hossein Bidgoli

Wydawca: Wiley

Dostępność: 3-6 tygodni

Cena: 401,10 zł

Przed złożeniem zamówienia prosimy o kontakt mailowy celem potwierdzenia ceny.


ISBN13:      

9780470372111

ISBN10:      

0470372117

Autor:      

Hossein Bidgoli

Oprawa:      

Hardback

Rok Wydania:      

2008-08-27

Ilość stron:      

896

Wymiary:      

207x155

Tematy:      

KM

Global Perspectives in Information Security, compiled by renowned expert and professor Hossein Bidgoli, offers an expansive view of current issues in information security. Written by leading academics and practitioners from around the world, this thorough resource explores and examines a wide range of issues and perspectives in this rapidly expanding field. Perfect for students, researchers, and practitioners alike, Professor Bidgoli′s book offers definitive coverage of established and cutting–edge theory and application in information security.

Spis treści:
Preface.
Part One: Legal Issues and Considerations.
Chapter 1: Cyberlaw: The Major Areas, Development, and Information Security Aspects (Dennis M. Powers, Southern Oregon University).
Chapter 2: Legal, Social, and Ethical Issues of the Internet (Kenneth Einar Himma, Seattle Pacific University).
Chapter 3: Cybercrime and the U.S. Criminal Justice System (Susan W. Brenner, University of Dayton School of Law).
Chapter 4: Cyberterrorism and Information Security (Charles Jaeger, Southern Oregon University).
Chapter 5: Law Enforcement and Computer Security Threats and Measures (Mathieu Deflem and J. Eagle Shutt, University of South Carolina).
Chapter 6: Corporate Spying: The Legal Aspects (William A. Zucker, Gadsby Hannah LLP and Scott Nathan, Independent Consultant).
Chapter 7: Spam and the Legal Counterattacks (Charles Jaeger, Southern Oregon University).
Chapter 8: Hacktivism (Paul A. Taylor, University of Leeds, United Kingdom and Jan Ll. Harris, University of Salford, United Kingdom).
Chapter 9: Online Contracts (G.E. Evans, Queen Mary Intellectual Property Research Institute, United Kingdom).
Chapter 10: Law Enforcement and Digital Evidence (J. Philip Craiger and Jeff Swauger, University of Central Florida and Mark Pollitt, DigitalEvidencePro).
Part Two: Social Is sues and Considerations.
Chapter 11: Privacy Law and the Internet (Ray Everett–Church, PrivacyClue LLC).
Chapter 12: Internet Censorship (Richard A. Spinello, Boston College).
Chapter 13: Anonymity and Identity on the Internet (Jonathan Wallace, DeCoMo USA Labs).
Chapter 14: Digital Identity (Drummond Reed, OneName Corporation and Jerry Kindall, Epok, Inc.).
Chapter 15: Digital Divide (Jaime J. Davila, Hampshire College).
Chapter 16: Medical Records Security (Normand M. Mariel, Medical Technology Research Corp).
Part Three: International Issues and Policy Considerations.
17: E–Government Security Issues and Measures (William C. Barker, National Institute of Standards and Technology).
Chapter 18: International Security Issues of E–Government (Karin Geiselhart, University of Canberra, Australia).
Chapter 19: Global Aspects of Cyberlaw (Julia Alpert Gladstone, Bryant University).
Chapter 20: Combating the Cybercrime Threat: Developments in Global Law Enforcement (Roderic Broadhurst, Queensland University of Technology, Australia).
Chapter 21: Information Leakage: Detection and Countermeasures (Phil Venables, Goldman Sachs).
Chapter 22: Wireless Information Warfare (Randall K. Nichols, The George Washington University & University of Maryland University College).
Chapter 23: E–Mail and Internet Use Policies (Nancy J. King, Oregon State University).
Chapter 24: Guidelines for a Comprehensive Security System (Hossein Bidgoli, California State University, Bakersfield).
Index.

Nota biograficzna:
Hossein Bidgoli, PhD, is professor of management information systems at California State University. Dr. Bidgoli helped set up the first PC lab in the United States and served as its first director. He is the author of 43 textbooks, 27 manuals, and more than five dozen technic al articles and papers on various aspects of computer applications, information systems and network security, e–commerce, and decision support systems published and presented throughout the world. Dr. Bidgoli also serves as the editor–in–chief of The Internet Encyclopedia, The Handbook of Information Security, The Handbook of Computer Networks, and the Encyclopedia of Information Systems.
The Encyclopedia of Information Systems was the recipient of one of Library Journal′s Best Reference Sources for 2002, and The Internet Encyclopedia was the recipient of one of the PSP Awards (Professional and Scholarly Publishing), 2004, awarded by the Association of American Publishers. Dr. Bidgoli was selected as the 2001–2002 Professor of the Year at California State University, Bakersfield.

Koszyk

Książek w koszyku: 0 szt.

Wartość zakupów: 0,00 zł

ebooks
covid

Kontakt

Gambit
Centrum Oprogramowania
i Szkoleń Sp. z o.o.

Al. Pokoju 29b/22-24

31-564 Kraków


Siedziba Księgarni

ul. Kordylewskiego 1

31-542 Kraków

+48 12 410 5991

+48 12 410 5987

+48 12 410 5989

Zobacz na mapie google

Wyślij e-mail

Subskrypcje

Administratorem danych osobowych jest firma Gambit COiS Sp. z o.o. Na podany adres będzie wysyłany wyłącznie biuletyn informacyjny.

Autoryzacja płatności

PayU

Informacje na temat autoryzacji płatności poprzez PayU.

PayU banki

© Copyright 2012: GAMBIT COiS Sp. z o.o. Wszelkie prawa zastrzeżone.

Projekt i wykonanie: Alchemia Studio Reklamy